100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
HUGE ITN 267 FINAL EXAM || A+ Verified Solutions. £15.05
Add to cart

Exam (elaborations)

HUGE ITN 267 FINAL EXAM || A+ Verified Solutions.

 6 views  0 purchase
  • Module
  • HUGE ITN 267
  • Institution
  • HUGE ITN 267

___________________________ must be in place for securing networks, facilities, and systems or groups of IT systems. They are intended for technologies or system components that are a part of the larger information security program. correct answers Subordinate Plans The term cyberwar specificall...

[Show more]

Preview 4 out of 51  pages

  • December 19, 2024
  • 51
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • HUGE ITN 267
  • HUGE ITN 267
avatar-seller
HUGE ITN 267 FINAL EXAM || A+ Verified Solutions.
___________________________ must be in place for securing networks, facilities, and systems
or groups of IT systems. They are intended for technologies or system components that are a part
of the larger information security program. correct answers Subordinate Plans

The term cyberwar specifically refers to conflicts between nations and their militaries. This is the
main distinction between cyberwar and other types of information system attacks that are
reported in the news media. (T or F) correct answers True

__________________ restrict the transmission of certain types of information to non-U.S.
citizens or non-permanent residents who are located in the United States. correct answers Export
control regulations

Which of the following are types of export control regulations? correct answers ITAR & EAR

One of the most important parts of a FISMA information security program is that agencies test
and evaluate it. FISMA requires each agency to perform "periodic testing and evaluation of the
effectiveness of information security policies, procedures, and practices." Agencies must test
every IT system—no matter the risk level— at least once a year (T or F) correct answers True

NIST created a FISMA Implementation Project to help it meet its FISMA duties. The project
helped it create FISMA-related standards and guidelines in a timely manner. The project had two
phases. In the first phase, NIST developed standards and guidelines to help agencies meet basic
FISMA requirements. The documents developed in this phase helped agencies create their
information security programs. (T or F) correct answers True

An inspector general (IG) is an official who reviews the actions of a federal agency. An IG
examines the agency's activities to make sure that it's operating efficiently and following good
governance practices. (T or F) correct answers True

Each agency must report yearly to the OMB on its FISMA compliance activities. An agency also
must send a copy of their yearly report to each of these agencies with the exception of: correct
answers Senate Committee on Foreign Relations

Congress created the _____________ in response to the September 11, 2001, terrorist attacks.
correct answers FISMA

FISMA requires the Department of Commerce to create information security standards and
guidelines. To which of the following organizations did the Department of Commerce delegate
this responsibility? correct answers NIST

Which of the following items is not part of the in "SP 800-37, Revision 1, Guide for Applying
the Risk Management Framework to Federal Information Systems: A Security Life Cycle
Approach" that NIST uses to create a risk management framework (RMF) approach to FISMA
compliance? correct answers Monitor security controls only when necessary

,The __________________________enforces trade sanctions and embargoes. correct answers
OFAC

Which of the following statements best captures the role and responsibility of NIST? correct
answers NIST creates the standards and guidelines for non-national security systems to help
agencies meet their FISMA obligations.

Under FISMA, the government must have a federal incident response (IR) center. The OMB is
responsible for this. Under FISMA, the IR center must: 1) give technical support to agencies
about information security incidents; 2) share information about security incidents; 3) protect
agencies from learning about current and potential threats and vulnerabilities; and 4) consult with
NIST and agencies with national security systems about information security incidents. (T or F)
correct answers False

From 2006 to 2012, the number of incidents reported by federal agencies to the USCERT
increased by 782 percent. (T or F) correct answers True

There's a growing trend in states such as California and North Carolina to specify the types of
information that should be included in a breach notice. Such content should be sure to fit the
following criteria: describe the incident in general terms; describe the type of personal
information that was involved in the breach; describe how the entity is going to protect the
personal information from additional unauthorized access; and advise the person being notified
to review his or her account statements and purchase access to his/her credit report from a
recommended list of vendors. (T or F) correct answers False

What was the first state to have a breach notification law? correct answers California

Which of the following statements summarizes why a breach notification is hard for entities?
correct answers States have different laws about what constitutes a breach.

Some states require entities doing business within the state to follow basic information security
practices, while other states are more aggressive and require entities to use specific security
practices, such as encryption. (T or F) correct answers True

Which of the follow does not count as personal information, as designated by California's
Database Security Breach Notification Act? correct answers student ID

In 2007 Minnesota created the Plastic Card Security Act, which is the first state law that
attempted to codify certain parts of the PCI DSS. It forbids businesses from storing cardholder
information for more than 48 hours after the credit card transaction is approved. Which of the
following lists of information can't be stored? correct answers card verification number, PIN
number, and contents of the card magnetic stripe

After the ChoicePoint breach, 46 states, including the District of Columbia, have created breach
notification laws. Although, most states used the California law as a model, there are some

,differences. Which of the following is not one of the differences? correct answers maximum
requirements for encryption

Georgia's notification law is unique because it applies to information brokers, which are entities
that sell personal data to other entities, as well as government agencies. (T or F) correct answers
False

Massachusetts' "Standards for the Protection of Personal Information of Residents of the
Commonwealth" was released in September 2008 and is known for being "unique" in terms of its
data protection standard. Which of the following statements best captures that uniqueness?
correct answers It attempts to regulate businesses outside of Massachusetts by requiring
businesses to encrypt the personal data of Massachusetts residents.

Nevada law defines data storage devices as computers, cell phones, and external computer hard
drives, but it excludes backup storage media. This portion of the law helps protect data if the
storage media is lost or stolen. (T or F) correct answers False

Congress can create laws in areas where the________________ allows it. correct answers U.S.
Constitution

Nevada's Security of Personal Information Law requires protection of personal information in a
number of ways and applies to which of the following? correct answers data collectors

What is considered to be personal information by most states? correct answers social security
numbers & account numbers

The California Database Security Breach Notification Act applies to state agencies, non-profit
organizations, and private organizations and businesses. (T or F) correct answers True

When it created its breach notification law in 2007, Massachusetts established itself as the state
with the nation's most flexible data protection laws. (T or F) correct answers False

A legal owner of property has the right to use that property in any way they want to, and the
power to give those rights to another. This is called _____________. correct answers property
interest

Which of the following is not a reason that patents are encouraged? correct answers Patents
guarantee financial prosperity for all inventors.

______________ patents are used for inventions and discoveries related to machines,
manufactured products, processes, and compositions of matter. correct answers Utility

Intellectual property law defines a protected period wherein the creator or author of a work or
invention is the only person who can use or reproduce it. This allows authors and inventors to
profit from their creative efforts, which encourages people to write new books or create new
inventions. (T or F) correct answers True

, Infringement cases occur when there's an infringing use of a similar trademark that's confusing
or deceptive to the customer, such as when a trademark is used to promote different goods. An
example would be Coca-Cola minivan or a Kleenex motorcycle. (T or F) correct answers False

_____________________ is the area of law that protects a person's creative ideas, inventions,
and innovations. correct answers Intellectual Property Law

Unlike ______________, trade secrets aren't registered. A person or business doesn't have to
meet any registration or procedural formalities for protection. correct answers Patents

The bad faith registration of a domain name that's a registered trademark or trade name of
another entity is referred to as: correct answers cybersquatting

_____________ are used to protect words, logos, and symbols that identify a product or services.
correct answers Trademarks

To establish a trade secret, the information that's to be protected must meet the following criteria:
have value; be unknown; be unascertainable; and be protected. (T or F) correct answers True

_______________ patents protect the visual appearance of a product. correct answers Design

The strongest type of a trademark is a descriptive trademark. A trademark is descriptive when it
describes the underlying product that it represents. (T or F) correct answers False

An infringer is a person who owns a patent but doesn't intend to make, use, or sell the invention.
The term refers to a person who is overly aggressive and opportunistic. (T or F) correct answers
False

Works of the U.S. government, such as the United States Code, are included under public
domain, which refers to the body of works that are free for public use and well as works where
the copyright has expired. (T or F) correct answers True

Plant patents are granted to inventors who invent or discover new: correct answers varieties of
plants

A ______________ protects the formulas, processes, methods, and information that give a
business a competitive edge. correct answers trade secret

Which of the following is not a reason an examiner might reject a trademark? correct answers
The proposed trademark may disparage or falsely suggest a connection with persons who have
been dead less than 100 years.

What is not required for an invention or discovery to be patentable? correct answers must be
environmentally sustainable

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £15.05. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£15.05
  • (0)
Add to cart
Added