100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 267 Final Study Guide || A Verified A+ Pass. £9.20
Add to cart

Exam (elaborations)

ITN 267 Final Study Guide || A Verified A+ Pass.

 7 views  0 purchase
  • Module
  • ITN 267
  • Institution
  • ITN 267

A keystroke logger is harmful code intentionally left on a computer system. It lies dormant for a certain period, and when specific conditions are met, it "explodes" and carries out its malicious function. correct answers False A reasonable expectation of privacy is the same as the reasonable pe...

[Show more]

Preview 2 out of 8  pages

  • December 19, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 267
  • ITN 267
avatar-seller
ITN 267 Final Study Guide || A Verified A+ Pass.
A keystroke logger is harmful code intentionally left on a computer system. It lies dormant for a
certain period, and when specific conditions are met, it "explodes" and carries out its malicious
function. correct answers False

A reasonable expectation of privacy is the same as the reasonable person standard. correct
answers False

All of the following are true with respect to cryptography except: correct answers only used
today by health care providers to protect health care data

How might the average person use cookies in a beneficial way? correct answers You save an
image of a relaxing, cloud-filled sky that appears every time you log-on to your Twitter account.

In which of the following types of communication is phishing least likely to occur? correct
answers phone calls

Integrity means that information systems and their data are accurate. correct answers True

____________ is the practice of tracking a user's actions on the Internet in order to create a user
profile. correct answers Online profiling

_____________ is an individual's right to control the use and disclosure of his or her own
personal data. correct answers Privacy

______________ means that only people with the right permission can access and use
information. correct answers Confidentiality

_______________ is the process of reviewing known vulnerabilities and threats. correct answers
Risk Analysis

________________ involves tricking other people into breaking security procedures and sharing
sensitive information. correct answers Social Engineering

__________________ is a body of law developed because of legal tradition and court cases.
correct answers Common Law

___________________ refers to applying safeguards designed to lower risks to a level deemed
acceptable but without eliminating such risks. correct answers Risk Mitigation

Which type of safeguard is put in place in order to limit the damage caused by a security
incident? correct answers Corrective

Which statement about privacy is NOT true? correct answers Privacy means that a person can
specify the collection, use, and sharing of their data.

, Which of the following correctly summarizes an employer's right to monitor telephone
conversations? correct answers An employer has right to monitor telephone conversations in the
ordinary course of business without a court order.

Which of the following U.S. Constitution amendments contribute to the right of privacy? correct
answers First, Third, and Fourth Amendments

Which of following is not one of the categories of vulnerabilities? correct answers Domain

What situation would be an example of an exploit? correct answers An art thief sneaks into a
museum and steals a famous painting and then sneaks out of the museum without being caught
by security because the thief identified and traveled through the museum via blind spots of the
museum's security cameras. After the incident, the museum increases the number of security
guards and cameras guarding the museum at all times.

What is a small string of text that a Web site stores on a user's computer? correct answers Cookie

A merchant of an e-commerce Web site wants to accept credit cards as a form of payment.
Which of the following must the merchant follow to ensure the safety of those payments? correct
answers PCI DSS

All of the following are examples of consumer financial information except: correct answers
Biometric Data

All of the following are examples of consumer financial institutions except: correct answers the
Federal Reserve System

Audits are ___________ performed by independent organizations. correct answers Occasionally

In the U.S. federal system, the U.S. Court of Appeals is the court of last resort. correct answers
False

Individual consumers are the targets of hackers far more often that financial institutions. correct
answers False

Nonpublic personal information (NPI) is personally identifiable financial information that a
consumer gives to a financial institution. NPI also includes private information that an institution
gets from other sources. It includes lists or descriptions of consumers that are prepared by using
this kind of information. correct answers True

Pretexting, which is also known as social engineering, is the act of trying to gain access to
customer information without proper authority to do so. correct answers True

The Federal Reserve reports directly to: correct answers the U.S. Congress

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £9.20. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£9.20
  • (0)
Add to cart
Added