Appendix A. Answer Key
CHAPTER 1 Information Systems Security
A
A
Availability
B
B
E
E
D
A
A
A
A
E
D
B
CHAPTER 2 Changing How People and Businesses Communicate
A
A
A: 5; B: 1; C: 3; D: 2; E: 4
E
B
B
E
A
B
B
E
D
A
CHAPTER 3 Malicious Attacks, Threats, and Vulnerabilities
A
C
B
Sniffer (or packet sniffer)
A
B
C
A
B
A
C
Threat
Vulnerability
B.
D
CHAPTER 4 The Drivers of the Information Security Business
B
A
B
D
B
D.
C
A
B
D
Business impact analysis (BIA)
B
HIPAA
B
CHAPTER 5 Access Controls
A
D
B
A
C
A.
B
B
D
B
E
B
D
A
D
CHAPTER 6 Security Operations and Administration
A
D
B
C
E
B
D
E
A
B
B
A
E
A
D
A
E
B
CHAPTER 7 Auditing, Testing, and Monitoring
A
E
B
C
E
A.
A
C
A
B
B
D
CHAPTER 8 Risk, Response, and Recovery
C.
A
A
D
C
E
A.
D.
B
C
CHAPTER 9 Cryptopgraphy
C
A
B
D
A
A
D
E
A
C
D
B
CHAPTER 10 Networks and Telecommunications
C.
A
B
A
D
Router
B
A
C
B
A
B
B
D
D
CHAPTER 11 Malicious Code and Activity ...
Get Fundamentals of Information Systems Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.