100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IAED FINAL EXAM ACTUAL EXAM COMPLETE QUESTIONS WITH DETAILED VERIFIED ANSWERS (100% CORRECT ANSWERS) /ALREADY GRADED A+ $17.99   Add to cart

Exam (elaborations)

IAED FINAL EXAM ACTUAL EXAM COMPLETE QUESTIONS WITH DETAILED VERIFIED ANSWERS (100% CORRECT ANSWERS) /ALREADY GRADED A+

 0 view  0 purchase
  • Course
  • Institution
  • Book

IAED FINAL EXAM ACTUAL EXAM COMPLETE QUESTIONS WITH DETAILED VERIFIED ANSWERS (100% CORRECT ANSWERS) /ALREADY GRADED A+

Preview 4 out of 35  pages

  • October 28, 2024
  • 35
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
avatar-seller
IAED FINAL EXAM ACTUAL EXAM COMPLETE
QUESTIONS WITH DETAILED VERIFIED ANSWERS (100%
CORRECT ANSWERS) /ALREADY GRADED A+
What measures the average amount of time between failures for a particular
system?
A. Uptime
B. Recovery time objective (RTO)
C. Mean time to failure (MTTF)
D. Mean time to repair (MTTR) - ANSWER: C. Mean time to failure (MTTF)

Remote access security controls help to ensure that the user connecting to an
organization's network is who the user claims to be. A username is commonly used
for _______, whereas a biometric scan could be used for _______.
A. identification, authentication
B. authorization, accountability
C. identification, authorization
D. authentication, authorization - ANSWER: A. identification, authentication

A brute-force password attack and the theft of a mobile worker's laptop are risks
most likely found in which domain of a typical IT infrastructure?
A. Local Area Network (LAN) Domain
B. Workstation Domain
C. Remote Access Domain
D. User Domain - ANSWER: C. Remote Access Domain

In which domain of a typical IT infrastructure is the first layer of defense for a layered
security strategy?
A. Workstation Domain
B. Local Area Network (LAN) Domain
C. User Domain
D. System/Application Domain - ANSWER: C. User Domain

Rachel is investigating an information security incident that took place at the high
school where she works. She suspects that students may have broken into the
student records system and altered their grades. If that is correct, which one of the
tenets of information security did this attack violate?
A. Integrity
B. Nonrepudiation
C. Confidentiality
D. Availability - ANSWER: A. Integrity

Which network device is designed to block network connections that are identified
as potentially malicious?
A. Intrusion detection system (IDS)
B. Intrusion prevention system (IPS)

,C. Router
D. Web server - ANSWER: B. Intrusion prevention system (IPS)

Which security control is most helpful in protecting against eavesdropping on wide
area network (WAN) transmissions?
A. Deploying an intrusion detection system/intrusion prevention system (IDS/IPS)
B. Applying filters on exterior Internet Protocol (IP) stateful firewalls
C. Encrypting transmissions with virtual private networks (VPNs)
D. Blocking Transmission Control Protocol (TCP) synchronize (SYN) open connections
- ANSWER: C. Encrypting transmissions with virtual private networks (VPNs)

What is a U.S. federal government classification level that applies to information that
would cause serious damage to national security if it were disclosed?
A. Top secret
B. Confidential
C. Secret
D. Private - ANSWER: C. Secret

What is a primary risk to the Workstation Domain, the Local Area Network (LAN)
Domain, and the System/Application Domain?
A. Unauthorized network probing and port scanning
B. Unauthorized access to systems
C. Downtime of IT systems for an extended period after a disaster
D. Mobile worker token or other authentication stolen - ANSWER: B. Unauthorized
access to systems

Which term describes the level of exposure to some event that has an effect on an
asset, usually the likelihood that something bad will happen to an asset?
A. Threat
B. Countermeasure
C. Risk
D. Vulnerability - ANSWER: C. Risk

Which compliance obligation includes security requirements that apply specifically to
the European Union?
A. Gramm-Leach-Bliley Act (GLBA)
B. Health Insurance Portability and Accountability Act (HIPAA)
C. General Data Protection Regulation (GDPR)
D. Federal Information Security Management Act (FISMA) - ANSWER: C. General Data
Protection Regulation (GDPR)

In Mobile IP, what term describes a device that would like to communicate with a
mobile node (MN)?
A. Correspondent node (CN)
B. Foreign agent (FA)
C. Home agent (HA)
D. Care of address (COA) - ANSWER: A. Correspondent node (CN)

,Which of the following enables businesses to transform themselves into an Internet
of Things (IoT) service offering?
A. Store-and-forward communications
B. Remote sensoring
C. Real-time tracking and monitoring
D. Anything as a Service (AaaS) delivery model - ANSWER: D. Anything as a Service
(AaaS) delivery model

Which of the following is an example of a business-to-consumer (B2C) application of
the Internet of Things (IoT)?
A. Video conferencing
B. Traffic monitoring
C. Health monitoring
D. Infrastructure monitoring - ANSWER: C. Health monitoring

Kaira's company recently switched to a new calendaring system provided by a
vendor. Kaira and other users connect to the system, hosted at the vendor's site,
using a web browser. Which service delivery model is Kaira's company using?
A. Communications as a Service (CaaS)
B. Software as a Service (SaaS)
C. Infrastructure as a Service (IaaS)
D. Platform as a Service (PaaS) - ANSWER: B. Software as a Service (SaaS)

From a security perspective, what should organizations expect will occur as they
become more dependent on the Internet of Things (IoT)?
A. Security risks will be eliminated.
B. Security risks will decrease.
C. Security risks will stay the same.
D. Security risks will increase. - ANSWER: D. Security risks will increase.

What is key to implementing a consistent Internet of Things (IoT) device,
connectivity, and communications environment?
A. Broadband capacity
B. Privacy laws
C. Interoperability and standards
D. Proprietary solutions - ANSWER: C. Interoperability and standards

With the use of Mobile IP, which device is responsible for assigning each mobile
node (MN) a local address?
A. Correspondent node (CN)
B. Home agent (HA)
C. Care of address (COA)
D. Foreign agent (FA) - ANSWER: D. Foreign agent (FA)

, Which action is the best step toward protecting Internet of Things (IoT) devices from
becoming the entry point for security vulnerabilities into a network while still
meeting business requirements?
A. Applying security updates promptly
B. Using encryption for communications
C. Removing IoT devices from the network
D. Turning IoT devices off when not in use - ANSWER: A. Applying security updates
promptly

Which term best describes the sale of goods and services on the Internet, whereby
online customers buy those goods and services from a vendor's website and enter
private data and checking account or credit card information to pay for them?
A. Economic development
B. E-commerce
C. Internet of Things (IoT)
D. Software as a Service (SaaS) - ANSWER: B. E-commerce

What type of attack against a web application uses a newly discovered vulnerability
that is not patchable?
A. Cross-site scripting (XSS)
B. Cross-site request forgery (CSRF)
C. Structured Query Language (SQL) injection
D. Zero-day attack - ANSWER: D. Zero-day attack

Maria is the risk manager for a large organization and is evaluating whether the
organization should purchase a fire suppression system. She consulted several
subject matter experts and determined that there is a 1 percent chance that a fire
will occur in a given year. If a fire occurred, it would likely cause $2 million in damage
to the facility, which has a $10 million value. If the exposure factor (EF) for a $10
million facility is 20 percent, what is the single loss expectancy (SLE)?
A. $20,000
B. $200,000
C. $2,000,000
D. $2,000 - ANSWER: C. $2,000,000

Maria is the risk manager for a large organization and is evaluating whether the
organization should purchase a fire suppression system. She consulted a variety of
subject matter experts and determined that there is a 1 percent chance that a fire
will occur in a given year. If a fire occurred, it would likely cause $2 million in damage
to the facility, which has a $10 million value. Given this scenario, what is the
annualized loss expectancy (ALE)?
A. $2,000
B. $20,000
C. $200,000
D. $2,000,000 - ANSWER: B. $20,000

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller charitywairimuuu. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart