100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Chapter 2 Information Security Fundamentals Exam Questions And Answers $6.39   Add to cart

Exam (elaborations)

Chapter 2 Information Security Fundamentals Exam Questions And Answers

 4 views  0 purchase
  • Course
  • Institution

Chapter 2 Information Security Fundamentals Exam Questions And Answers How do you turn data into knowledge? A. These are both names for the same concepts, so no action is required. B. You use lots of data to observe general ideas and then test those ideas with more data you observe, until you ...

[Show more]

Preview 2 out of 11  pages

  • April 17, 2024
  • 11
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Chapter 2 Information Security Fundamentals
Exam Questions And Answers
How do you turn data into knowledge?
A. These are both names for the same concepts, so no action is required.
B. You use lots of data to observe general ideas and then test those ideas with
more data you observe, until you can finally make broad, general conclusions.
These conclusions are what are called knowledge.
C. You apply data smoothing and machine learning techniques, and the decision
rules this produces are called knowledge.
D. You have to listen to the data to see what it’s telling you, and then you’ll know.
B.
This is the scientific method in action: make observations, ask questions, make
informed guesses, get more data, and see if it fits what you think you've learned thus
far. Repeat until you are highly confident.
Which is more important to a business—its information or its information
technology?
A. Neither, since it is the business logic and business processes that give the
business its competitive advantage.
B. The information is more important, because all that the information technology
does is make the information available to people to make decisions with.
C. The information technology is more important, because without it, none of the
data could be transformed into information for making decisions with.
D. Both are equally important, because in most cases, computers and
communications systems are where the information is gathered, stored, and
made available.
B.
People make decisions based on what they know, what they remember, and what they
observe; that data, information, and knowledge are independent of the paper, books,
computers, or radio waves that brought those observations to them in the first place.

, Options C and D confuse the role of the technologies with the information itself; option A
is a true statement that does not address the actual question.
As the IT security director, Paul does not have anybody looking at systems
monitoring or event logging data. Which set of responsibilities is Paul in violation
of?
A. Due care
B. Due diligence
C. None of the above
D. Both due care and due diligence
B.
The fact that systems monitoring and event data is collected at all indicates that Paul or
his staff determined it was a necessary part of keeping the organization's information
systems secure—they took (due) care of those responsibilities. But by not reviewing the
data to verify proper systems behavior and use, or to look for potential intrusions or
compromises, Paul has not been diligent.
Explain the relationship between confidentiality and privacy, if any.
A. Confidentiality is about keeping information secret so that we retain advantage
or do not come to harm; privacy is about choosing who can enter into one’s life
or property.
B. Confidential information is information that must be kept private, so they really
have similar meanings.
C. Privacy laws allow criminals to hide their actions and intentions from society,
but confidentiality allows for the government to protect defense-related
information from being leaked to enemies.
D. Confidentiality is the freedom to choose with whom you share information;
privacy refers to information that is specifically about individuals’ lives, activities,
or interests.
A.
Keeping information secret means agreeing to limit or control how (or if) that information
can be passed on to others. Privacy is the freedom from intrusion into your own affairs,

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MUTUKACOURSEHERO. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $6.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77851 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$6.39
  • (0)
  Add to cart