APPENDIX A: Answer Key

CHAPTER 1 Information Systems Security

  1. A

  2. A

  3. C

  4. A

  5. B

  6. E

  7. E

  8. D

  9. A

  10. A

  11. A

  12. A

  13. E

  14. D

  15. B

CHAPTER 2 The Internet of Things Is Changing How We Live

  1. A

  2. E

  3. D

  4. E

  5. E

  6. E

  7. B

  8. A

  9. B

  10. E

  11. B

  12. C

CHAPTER 3 Malicious Attacks, Threats, and Vulnerabilities

  1. A

  2. E

  3. B

  4. packet sniffer

  5. A

  6. A

  7. D

  8. E

  9. A

  10. C

  11. C

  12. threat

  13. vulnerability

  14. B

  15. D

CHAPTER 4 The Drivers of the Information Security Business

  1. A

  2. A

  3. B

  4. E

  5. B

  6. D

  7. E

  8. A

  9. A

  10. D

  11. C

  12. E

  13. HIPAA

  14. A

  15. E

CHAPTER 5 Access Controls

  1. A

  2. D

  3. B

  4. A

  5. C

  6. A

  7. B

  8. B

  9. D

  10. B

  11. E

  12. B

  13. D

  14. A

  15. D

CHAPTER 6 Security Operations and Administration

  1. A

  2. D

  3. B

  4. C

  5. B

  6. B

  7. D

  8. E

  9. A

  10. B

  11. B

  12. A

  13. E

  14. A

  15. D

  16. A

  17. E

  18. B

CHAPTER 7 Auditing, Testing, and Monitoring

  1. A

  2. E

  3. B

  4. C

  5. E

  6. A

  7. A

  8. C

  9. A

  10. B

  11. B

  12. D

CHAPTER 8 Risk, Response, and Recovery

  1. C

  2. A

  3. A

  4. A

  5. C

  6. E

  7. A

  8. D

  9. B

  10. C

CHAPTER 9 Cryptography

  1. C

  2. A

  3. B

  4. D

  5. A

  6. A

  7. A

  8. E

  9. A

  10. A

Get Fundamentals of Information Systems Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.