Appendix A. Answer Key

CHAPTER 1 Information Systems Security

  1. A

  2. A

  3. Availability

  4. B

  5. B

  6. E

  7. E

  8. D

  9. A

  10. A

  11. A

  12. A

  13. E

  14. D

  15. B

CHAPTER 2 Changing How People and Businesses Communicate

  1. A

  2. A

  3. A: 5; B: 1; C: 3; D: 2; E: 4

  4. E

  5. B

  6. B

  7. E

  8. A

  9. B

  10. B

  11. E

  12. D

  13. A

CHAPTER 3 Malicious Attacks, Threats, and Vulnerabilities

  1. A

  2. C

  3. B

  4. Sniffer (or packet sniffer)

  5. A

  6. B

  7. C

  8. A

  9. B

  10. A

  11. C

  12. Threat

  13. Vulnerability

  14. B.

  15. D

CHAPTER 4 The Drivers of the Information Security Business

  1. B

  2. A

  3. B

  4. D

  5. B

  6. D.

  7. C

  8. A

  9. B

  10. D

  11. Business impact analysis (BIA)

  12. B

  13. HIPAA

  14. B

CHAPTER 5 Access Controls

  1. A

  2. D

  3. B

  4. A

  5. C

  6. A.

  7. B

  8. B

  9. D

  10. B

  11. E

  12. B

  13. D

  14. A

  15. D

CHAPTER 6 Security Operations and Administration

  1. A

  2. D

  3. B

  4. C

  5. E

  6. B

  7. D

  8. E

  9. A

  10. B

  11. B

  12. A

  13. E

  14. A

  15. D

  16. A

  17. E

  18. B

CHAPTER 7 Auditing, Testing, and Monitoring

  1. A

  2. E

  3. B

  4. C

  5. E

  6. A.

  7. A

  8. C

  9. A

  10. B

  11. B

  12. D

CHAPTER 8 Risk, Response, and Recovery

  1. C.

  2. A

  3. A

  4. D

  5. C

  6. E

  7. A.

  8. D.

  9. B

  10. C

CHAPTER 9 Cryptopgraphy

  1. C

  2. A

  3. B

  4. D

  5. A

  6. A

  7. D

  8. E

  9. A

  10. C

  11. D

  12. B

CHAPTER 10 Networks and Telecommunications

  1. C.

  2. A

  3. B

  4. A

  5. D

  6. Router

  7. B

  8. A

  9. C

  10. B

  11. A

  12. B

  13. B

  14. D

  15. D

CHAPTER 11 Malicious Code and Activity ...

Get Fundamentals of Information Systems Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.