1. Information security evolved from the early field of:A) Computer SecurityB) Micro-EconomicsC) Data AnalysisD) None of the above2. To make sounddecisions about information security, management needs to be informed aboutthreats to its:A) Market standing, competition, and computer viability.B) People, applications, data, and information systemsC) Information systems, computer infrastructure, andregulatory policies.D) All of the above3. Policies must be read and agree to before they are: A) ImplementedB) PublishedC) DisseminatedD) Binding4. The_________________should be a driving force in theplanning and governance activities of the organization as a whole.A) Enterprise analysis policyB) Enterprise information security policyC) Information governanceD) Management computer exception policy5. Which of the following is one of the five groupings offirewalls:A) Packet filteringB) Exceptional logic baseC) Static hybridD) None of the above6. The process ofdetermining how to admit a user into a trusted area of the organization isknown as:A) Mandatory reportingB) Firewall protectionC) User permissionD) None of the above7. Decoy systemsdesigned to lure attackers away from critical systems are known as:A) Trap and traceB) Active intrusion protectionC) HoneypotsD) Sitting ducks 8. There are threebasic types of fire detection systems; thermal detection, smoke detection, and:A) Heat detectionB) Flame detectionC) Both A and BD) None of the above9. If multiple copies of a classified document are made,they should be:A) Numbered and trackedB) Destroyed upon readingC) Available only through subpoenaD) Given only to management10. The model that isa proven method for prioritizing a program of complex change is known asthe_____________model. A) GovernanceB) SecurityC) Bull’s eyeD) ISO 27001