ITN 267 Midterm || Questions and 100% Accurate Answers.
6 views 0 purchase
Module
ITN 267
Institution
ITN 267
What is the ISO/IEC 27002? correct answers a reference guide to help organizations choose safeguards
___________________________ must be in place for securing networks, facilities, and systems or groups of IT systems. They are intended for technologies or system components that are a part of the...
ITN 267 Midterm || Questions and 100% Accurate Answers.
What is the ISO/IEC 27002? correct answers a reference guide to help organizations choose
safeguards
___________________________ must be in place for securing networks, facilities, and systems
or groups of IT systems. They are intended for technologies or system components that are a part
of the larger information security program. correct answers Subordinate plans
_____________________ are tools that filter offensive content. correct answers Technology
protection measures (TPM)Proxy serversSpam blockers
Which of following is not one of the categories of vulnerabilities? correct answers domain
The three branches of the federal government are: correct answers executive, legislative, and
judicial
Which of the following are types of export control regulations? correct answers both A and B
Which of the following is true about U.S. Supreme Court justices? correct answers They are
nominated by the president.
Which of the following items is not part of the in "SP 800-37, Revision 1, Guide for Applying
the Risk Management Framework to Federal Information Systems: A Security Life Cycle
Approach" that NIST uses to create a risk management framework (RMF) approach to FISMA
compliance? correct answers monitor security controls only when necessary
____________ is the practice of tracking a user's actions on the Internet in order to create a user
profile. correct answers Online profiling
Under the ____________________, federal agencies must 1) review their IT systems for privacy
risks; 2) post privacy policies on their Web sites; 3) post machine-readable privacy policies on
their Web sites; and 4) report privacy activities to the OMB. correct answers E-Government Act
of 2002
All of the following are examples of consumer financial information except: correct answers
biometric data
Based on the descriptions given, what film does NOT exemplify the concept of social
engineering? correct answers Office Space
Which of the following roles is not included in the domain of a creditor? correct answers collects
payment in arrears
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £8.78. You're not tied to anything after your purchase.