100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 267 MIDTERM || WITH ERROR-FREE SOLUTIONS. £9.61
Add to cart

Exam (elaborations)

ITN 267 MIDTERM || WITH ERROR-FREE SOLUTIONS.

 6 views  0 purchase
  • Module
  • ITN 267
  • Institution
  • ITN 267

The main goal of information security is to protect: correct answers Confidentiality, Integrity, Availability All of the following are true with respect to cryptography except: correct answers only used today by health care providers to protect health care data _______________ is the process ...

[Show more]

Preview 2 out of 11  pages

  • December 19, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 267
  • ITN 267
avatar-seller
ITN 267 MIDTERM || WITH ERROR-FREE SOLUTIONS.
The main goal of information security is to protect: correct answers Confidentiality, Integrity,
Availability

All of the following are true with respect to cryptography except: correct answers only used
today by health care providers to protect health care data

_______________ is the process of reviewing known vulnerabilities and threats. correct answers
risk analysis

What is the process of applying safeguards to avoid a negative impact? correct answers risk
avoidance

___________________ refers to applying safeguards designed to lower risks to a level deemed
acceptable but without eliminating such risks. correct answers Risk mitigation

______________ means that only people with the right permission can access and use
information. correct answers Confidentiality

All of the following are ways to protect confidentiality except: correct answers Shoulder surfing

________________ involves tricking other people into breaking security procedures and sharing
sensitive information. correct answers Social engineering

What is the window of vulnerability? correct answers the time between exploit discovery and an
installed security patch

The Florida A&M case illustrates which of the following about safeguards? correct answers how
safeguards protect the integrity of computer systems

A single point of failure is a piece of hardware or application that is key to
________________________. correct answers the functioning of the entire system

Which of following is not one of the categories of vulnerabilities? correct answers Domain

The separation of duties principle requires which of the following practices? correct answers that
two or more employees must split critical task functions so that no employee knows all of the
steps of the critical task

Which of the following statements summarizes why the window of vulnerability is shrinking?
correct answers More people are interested in information security, and have developed the skills
to find new vulnerabilities.

, This domain refers to the equipment and data an organization uses to support its IT
infrastructure. It includes hardware, operating system software, database software, and client-
server applications correct answers System/Application Domain

In which of the following types of communication is phishing least likely to occur? correct
answers phone calls

A _____________ is a method of controlled entry into a facility and provides access to secure
areas such as a research lab or data center. correct answers Mantrap

Which type of safeguard is put in place in order to limit the damage caused by a security
incident? correct answers corrective

What situation would be an example of an exploit? correct answers An art thief sneaks into a
museum and steals a famous painting and then sneaks out of the museum without being caught
by security because the thief identified and traveled through the museum via blind spots of the
museum's security cameras. After the incident, the museum increases the number of security
guards and cameras guarding the museum at all times.

In what ways can you classify safeguards? correct answers Safeguards can be classified by how
they work or how they act.

_____________ is an individual's right to control the use and disclosure of his or her own
personal data. correct answers Privacy

What is the source of legal authority for the U.S. government? correct answers U.S. Constitution

Which of the following U.S. Constitution amendments contribute to the right of privacy? correct
answers First, Third, and Fourth Amendments

__________________ is a body of law developed because of legal tradition and court cases.
correct answers common law

A ______________ is some kind of wrongful act that harms or hurts a person. correct answers
tort

What is a small string of text that a Web site stores on a user's computer? correct answers Cookie

The first state to enact anti-spyware legislation was: correct answers Utah

Which Act established the public's right to request information from federal agencies? correct
answers Freedom of Information Act

A ______________ is the official schedule of a court and the events in cases pending before a
court. correct answers docket

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £9.61. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£9.61
  • (0)
Add to cart
Added