Question: Information security is defined as

Answer Options:

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide incentives, confidence and avoidance
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide intelligence, control and evidence
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide insights, competence and advantage
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

Answer: Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality and availability

 

Question: Confidentiality is

Answer Options:

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity
Protecting information and information systems from unauthorized use
Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
Ensuring timely and reliable access to and use of information

Answer: Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices

 

Question: Integrity is

Answer Options:

Preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information Choices
Ensuring timely and reliable access to and use of information
Protecting information and information systems from unauthorized use
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

Answer: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

 

Question: Availability is

Answer Options:

Ensuring timely and reliable access to and use of information
Protecting information and information systems from unauthorized use

Answer: Ensuring timely and reliable access to and use of information

 

Question: Of the measures you can take to improve your personal security, the least important is

Answer Options:

Using end-point (virus) protection
Spending lots of money
Automating software updates
Using appropriate passwords

Answer: Spending lots of money

 

Question: The Sarbanes-Oxley act was enacted in 2002 to prevent

Answer Options:

Stealing commercial information by exploiting weaknesses in wireless networks
Intruding into a number of high profile computer installations
Fabrication of financial records at publicly traded companies
Causing one of the most significant internet outages ever

Answer: Fabrication of financial records at publicly traded companies Correct Answer: True

 

Question: The submission link of a course requirement will go offline after the due date, preventing students to make a late submission.

Answer Options:

True
False

Answer: True

 

Question: The professor may not respond to email inquiries after 7pm. So, students should get help early.

Answer Options:

True
False

Answer: True

 

Question: The professor will post the grades of assignments within 5 business days (except unexpected circumstances).

Answer Options:

True
False

Answer: True

 

Question: Students who have Windows computers can download and install Microsoft Office (for free) from USF.

Answer Options:

True
False

Answer: True

 

Question: A data model is usually graphical.

Answer Options:

True
False

Answer: True

 

Question: Business rules must be rendered in writing.

Answer Options:

True
False

Answer: True

 

Question: A(n) _____’s main function is to help one understand the complexities of the real-world environment.

Answer Options:

node
entity
model
database

Answer: model

 

Question: A(n) _____ represents a particular type of object in the real world.

Answer Options:

attribute
entity
relationship
node

Answer: entity

 

Question: A(n) _____ is the equivalent of a field in a file system.

Answer Options:

attribute
entity
relationship
constraint

Answer: attribute

 

Question: A(n) _____ is a restriction placed on the data.

Answer Options:

attribute
entity
relationship
constraint

Answer: constraint

 

Question: MySQL is an example of the _____.

Answer Options:

hierarchical model
file system data model
relational data model
entity relationship model

Answer: relational data model

 

Question: A(n) _____ enables a database administrator to describe schema components.

Answer Options:

extensible markup language (XML)
data definition language (DDL)
unified modeling language (UML)
query language

Answer: data definition language (DDL)