100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MISY 5325 - Ch. 5 & 6 Questions and Answers fully solved $13.49   Add to cart

Exam (elaborations)

MISY 5325 - Ch. 5 & 6 Questions and Answers fully solved

 7 views  0 purchase
  • Course
  • MISY
  • Institution
  • MISY

MISY 5325 - Ch. 5 & 6

Preview 2 out of 7  pages

  • October 5, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MISY
  • MISY
avatar-seller
julianah420
MISY 5325 - Ch. 5 & 6

A MAC address uses which of the following formats? - answer Hexadecimal

Which of the following is a hardware identification number that uniquely identifies a
device? – answer MAC address

Which of the following means the loss of CIA could be expected to have a limited
adverse effect on organizational operations, organizational assets, or individuals? -
answer Low potential impact

Which of the following classification levels for national security information refers to any
information or material the unauthorized disclosure of which reasonably could be
expected to cause serious damage to the national security? - answer Secret

Which of the following refers to programs or code that provide the interface between the
hardware, the users, and the data? - answerSoftware assets

Why shouldn't information about specific systems be included in a job description? -
answerTo protect against social engineering and other attacks

Which of the following is part of the user provisioning phase of the employee life cycle?
- answerThe employee is provided with a username or smart card.

Which of the following NIST publications is known as The NIST Handbook? - answerSP
800-12

A confidentiality agreement for employees, contractors, and outsourcers is also known
as which of the following? - answerNon-disclosure agreement

During what stage of the employee life cycle are user accounts disabled? -
answerTermination

Which of the following is not one of the responsibilities of a data owner? -
answerImplementing security controls for the asset

Which of the following best described the Bell-Lapadula security model? - answerNo
read up, no write down

Which data type protected by DLP includes patent applications, product design
documents, the source code of the software, research information, and customer data?
- answerIntellectual Property (IP)

, The objective of an __________ is to differentiate data types to enable organizations to
safeguard CIA based on content. - answerinformation classification system

Which of the following specifies that schools must have written permission to release
any information from a student s education record? - answerFERPA

Which stage of the employee life cycle includes the process for transitioning employees
out of an organization? - answerOff-boarding

Which of the following terms best describes a definable piece of information, stored in
any
manner, that is recognized as having value to the organization? - answerInformation
asset

Information systems __________, __________, and __________ information. -
answerstore, process, and transmit

Information owners are responsible for which of the following tasks? - answerClassifying
information

Which of the following roles is responsible for implementing and maintaining security
controls
and reporting suspected incidents? - answerInformation custodian

FIPS-199 requires that federal government information and information systems be
classified as ____________. - answerlow, moderate, high security

Information classification systems are used in which of the following organizations?

A. Government
B. Military
C. Financial institutions - answerAll of the above

FIPS requires that information be evaluated for _____________requirements with
respect to
the impact of unauthorized disclosure as well as the use of the information -
answersecrecy

Which of the following National Security classifications requires the most protection? -
answerTop Secret

Which of the following National Security classifications requires the least protection? -
answerSensitive But Unclassified (SBU)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart