The main goal of information security is to protect: correct answers Confidentiality, Integrity, Availability
All of the following are true with respect to cryptography except: correct answers only used today by health care providers to protect health care data
_______________ is the process ...
the main goal of information security is to protec
Written for
ITN 267
ITN 267
Seller
Follow
FullyFocus
Reviews received
Content preview
ITN 267 MIDTERM || WITH ERROR-FREE SOLUTIONS.
The main goal of information security is to protect: correct answers Confidentiality, Integrity,
Availability
All of the following are true with respect to cryptography except: correct answers only used
today by health care providers to protect health care data
_______________ is the process of reviewing known vulnerabilities and threats. correct answers
risk analysis
What is the process of applying safeguards to avoid a negative impact? correct answers risk
avoidance
___________________ refers to applying safeguards designed to lower risks to a level deemed
acceptable but without eliminating such risks. correct answers Risk mitigation
______________ means that only people with the right permission can access and use
information. correct answers Confidentiality
All of the following are ways to protect confidentiality except: correct answers Shoulder surfing
________________ involves tricking other people into breaking security procedures and sharing
sensitive information. correct answers Social engineering
What is the window of vulnerability? correct answers the time between exploit discovery and an
installed security patch
The Florida A&M case illustrates which of the following about safeguards? correct answers how
safeguards protect the integrity of computer systems
A single point of failure is a piece of hardware or application that is key to
________________________. correct answers the functioning of the entire system
Which of following is not one of the categories of vulnerabilities? correct answers Domain
The separation of duties principle requires which of the following practices? correct answers that
two or more employees must split critical task functions so that no employee knows all of the
steps of the critical task
Which of the following statements summarizes why the window of vulnerability is shrinking?
correct answers More people are interested in information security, and have developed the skills
to find new vulnerabilities.
, This domain refers to the equipment and data an organization uses to support its IT
infrastructure. It includes hardware, operating system software, database software, and client-
server applications correct answers System/Application Domain
In which of the following types of communication is phishing least likely to occur? correct
answers phone calls
A _____________ is a method of controlled entry into a facility and provides access to secure
areas such as a research lab or data center. correct answers Mantrap
Which type of safeguard is put in place in order to limit the damage caused by a security
incident? correct answers corrective
What situation would be an example of an exploit? correct answers An art thief sneaks into a
museum and steals a famous painting and then sneaks out of the museum without being caught
by security because the thief identified and traveled through the museum via blind spots of the
museum's security cameras. After the incident, the museum increases the number of security
guards and cameras guarding the museum at all times.
In what ways can you classify safeguards? correct answers Safeguards can be classified by how
they work or how they act.
_____________ is an individual's right to control the use and disclosure of his or her own
personal data. correct answers Privacy
What is the source of legal authority for the U.S. government? correct answers U.S. Constitution
Which of the following U.S. Constitution amendments contribute to the right of privacy? correct
answers First, Third, and Fourth Amendments
__________________ is a body of law developed because of legal tradition and court cases.
correct answers common law
A ______________ is some kind of wrongful act that harms or hurts a person. correct answers
tort
What is a small string of text that a Web site stores on a user's computer? correct answers Cookie
The first state to enact anti-spyware legislation was: correct answers Utah
Which Act established the public's right to request information from federal agencies? correct
answers Freedom of Information Act
A ______________ is the official schedule of a court and the events in cases pending before a
court. correct answers docket
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £9.61. You're not tied to anything after your purchase.