A _____________ is a method of controlled entry into a facility and provides access to secure areas such as a research lab or data center. correct answers Mantrap
Biometric data is considered personally identifiable information. T or F correct answers True
A contract tells an organization how...
ITN 267 || with 100% Error-free Solutions.
A _____________ is a method of controlled entry into a facility and provides access to secure
areas such as a research lab or data center. correct answers Mantrap
Biometric data is considered personally identifiable information. T or F correct answers True
A contract tells an organization how it must act and the consequences for failing to act properly.
T or F correct answers False
All of the following are ways to protect confidentiality except: correct answers Shoulder surfing
What is the purpose of Executive Order 13526? correct answers It describes rules for using and a
system of for classifying national security information.
While external and internal attackers are both deliberate threats, only internal attackers seek to
embarrass an organization. T or F correct answers False
Confidential describes information that could cause damage to U.S. security if disclosed to an
unauthorized person. This is the lowest data classification level. T or F correct answers True
A keystroke logger is harmful code intentionally left on a computer system. It lies dormant for a
certain period, and when specific conditions are met, it "explodes" and carries out its malicious
function. T or F correct answers False
In what ways can you classify safeguards? correct answers Safeguards can be classified by how
they work or how they act.
The United States has one comprehensive data protection law and relies on the Federal Trade
Commission (FTC) to ensure compliance. T or F correct answers False
Threats fall into four categories: Human, Natural, Technology and Operational, and Physical and
Environmental. T or F correct answers True
Based on the descriptions given, what film does NOT exemplify the concept of social
engineering? correct answers Office Space: Three friends and disgruntled coworkers at a tech
company discover that the company's accounting system has a computer glitch that calculates
certain financial information to six decimal points, but only records the first two decimal points
in the accounting files and then regularly discards the remaining fractions of pennies. When the
trio learns their jobs are in jeopardy, they create a computer program that diverts the discarded
fractions of pennies into a bank account they share. They believe that the company will continue
to pay them in installments small enough that the company will never notice but that will lead to
a very large amount of money over time.
, The domain of Telecommunications and Network Security describes how to protect information
systems resources during their normal operational state. It includes items such as vulnerability
management and incident response activities. T or F correct answers False
Physical safeguards are actions that an organization takes to protect its actual, tangible resources.
They keep unauthorized individuals out of controlled areas. T or F correct answers True
Organizations have a number of options for responding to risk, which include risk avoidance,
risk mitigation, and risk transfer. T or F correct answers True
The separation of duties principle requires which of the following practices? correct answers that
two or more employees must split critical task functions so that no employee knows all of the
steps of the critical task
Patches exacerbate vulnerabilities, because they merely mask problems but do not offer
solutions. T or F correct answers False
All information—no matter how sensitive—should have the extensive protection of safeguards.
T or F correct answers False
In which of the following types of communication is phishing least likely to occur? correct
answers Phone calls
_______________ is the process of reviewing known vulnerabilities and threats. correct answers
Risk Analysis
The Florida A&M case illustrates which of the following about safeguards? correct answers how
safeguards protect the integrity of computer systems
______________ means that only people with the right permission can access and use
information. correct answers Confidentiality
What is the ISO/IEC 27002? correct answers a reference guide for standardized computing
practices for large organizations
Which of the following statements summarizes why the window of vulnerability is shrinking?
correct answers More people are interested in information security, and have developed the skills
to find new vulnerabilities.
The C-I-A triad refers to the way that the Central Intelligence Agencies classifies sensitive
information. T or F correct answers False
The 2006 U.S. Federal Trade Commission (FTC) alleged that Zango, Inc., an Internet marketing
company, had used unfair and deceptive methods to download _____________ onto computers.
correct answers adware
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.03. You're not tied to anything after your purchase.