100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 266 EXAM QUESTIONS AND ANSWERS ALL CORRECT

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
10-10-2024
Written in
2024/2025

ITN 266 EXAM QUESTIONS AND ANSWERS ALL CORRECT What type of organization is subject to FISMA? e-commerce firms medical firms government organizations companies that accept credit card payments - Answer- government organizations The FTC can ________. Both impose fines and require annual audits by external auditing firms for many years impose fines Neither impose fines nor require annual audits by external auditing firms for many years require annual audits by external auditing firms for many years - Answer- Both impose fines and require annual audits by external auditing firms for many years Once a company's resources are enumerated, the next step is to ________. create a protection plan for each classify them according to sensitivity enumerate threats to each assess the degree to which each is already protected - Answer- classify them according to sensitivity The growing number of compliance laws and regulations is driving firms to use formal governance frameworks to guide their security processes. True / False - Answer- True Independence is best provided for IT security by placing it within the IT department. True / False - Answer- False ________ is the security guarantee that people who intercept messages cannot read them. Availability Confidentiality Integrity Encryption - Answer- Confidentiality A ________ is a mathematical process used in encryption and decryption. plaintext cipher coding method key - Answer- cipher

Show more Read less
Institution
ITN 266
Module
ITN 266

Content preview

ITN 266 EXAM QUESTIONS AND
ANSWERS ALL CORRECT

What type of organization is subject to FISMA?
e-commerce firms
medical firms
government organizations
companies that accept credit card payments - Answer- government organizations

The FTC can ________.
Both impose fines and require annual audits by external auditing firms for many years
impose fines
Neither impose fines nor require annual audits by external auditing firms for many years
require annual audits by external auditing firms for many years - Answer- Both impose
fines and require annual audits by external auditing firms for many years

Once a company's resources are enumerated, the next step is to ________.
create a protection plan for each
classify them according to sensitivity
enumerate threats to each
assess the degree to which each is already protected - Answer- classify them according
to sensitivity

The growing number of compliance laws and regulations is driving firms to use formal
governance frameworks to guide their security processes. True / False - Answer- True

Independence is best provided for IT security by placing it within the IT department.
True / False - Answer- False

________ is the security guarantee that people who intercept messages cannot read
them.
Availability
Confidentiality
Integrity
Encryption - Answer- Confidentiality

A ________ is a mathematical process used in encryption and decryption.
plaintext
cipher
coding method
key - Answer- cipher

, What usually is the longest stage in a cryptographic system dialogue?
keying
negotiation of security methods and parameters
ongoing communication
mutual authentication - Answer- ongoing communication

In authentication, the party trying to provide its identity to the other party is called the
applicant. True / False - Answer- False

DES uses block encryption. True / False - Answer- True

The hash size in MD-5 is 160 bits. True / False - Answer- False

In order to be considered strong today, a symmetric encryption key must be at least
________ bits long.
1,000
100
6
8 - Answer- 100

Nearly all encryption for confidentiality uses symmetric key encryption ciphers. True /
False - Answer- True

Someone who pretends to be someone else is ________.
cryptanalyst
an impostor
a hacker
a social engineer - Answer- an impostor

________ is efficient enough in processing power and RAM requirements to be used on
small devices, such as PDAs and cell phones.
AES
3DES
Neither 3DES nor AES
Both 3DES and AES - Answer- AES

Hashing is a reversible process. True / False - Answer- False

In cryptographic systems, keying takes place during the second handshaking stage.
True / False - Answer- False

A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt
messages.
key
plaintext
code

Written for

Institution
ITN 266
Module
ITN 266

Document information

Uploaded on
October 10, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • itn 266
  • itn 266 exam

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
805
Member since
3 year
Number of followers
476
Documents
15658
Last sold
2 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

165 reviews

5
87
4
21
3
27
2
6
1
24

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions