Cyber Security Exam 1 Questions and Answers Latest Updated
7 views 0 purchase
Course
Cyber Security
Institution
Cyber Security
Cyber Security Exam 1 Questions and Answers Latest Updated
Information security is specific to securing information, whereas information systems security is focused on the security of the systems that house the information. True or False?
True
Software manufacturers limit their liability w...
cyber security exam 1 questions and answers latest
information security is specific to securing infor
the tenet of information systems security is c
encrypting data on storage devices or hard drives
Written for
Cyber Security
Cyber Security
Seller
Follow
julianah420
Reviews received
Content preview
Cyber Security Exam 1 Questions and
Answers Latest Updated
Information security is specific to securing information, whereas information systems
security is focused on the security of the systems that house the information. True or
False? - answer True
Software manufacturers limit their liability when selling software using which of the
following? - answer End-User License Agreement (EULA)
The ___ tenet of information systems security is concerned with the recovery time
objective. - answer Availability
Encrypting data on storage devices or hard drives is a main strategy to ensure data
integrity. True or False? - answer False
Organizations that require customer-service representatives to access private customer
data can best protect customer privacy and make it easy to access other customer data
by using which of the following security controls? - answer Blocking out customer
private data details and allowing access only to the last four digits of Social Security
numbers or account numbers.
The ___ is the weakest link in an IT infrastructure. - answerUser Domain
Which of the following security controls can help mitigate malicious e-mail attachments?
- answerAll of the above
You can help ensure confidentiality by implementing ___. - answerA virtual private
network for remote access
Encrypting e-mail communication is needed if you are sending confidential information
within an e-mail message through the public internet. True or False? - answerTrue
Using security policies, standards, procedures, and guidelines helps organizations
decrease risks and threats. True or False? - answerTrue
A data classification standard is usually part of which policy definition? - answerAsset
protection policy
The SSCP profession certification is geared toward which of the following information
systems security positions? - answerIT security practitioner
, Maximizing availability primarily involves minimizing ___. - answerAll of the above
Which of the following is not a U.S. compliance law or act? - answerPCI DSS
Internet IP packets are to cleartext what ecnrypted IP packets are to___. -
answerCiphertext
The internet is an open, public network shared by the entire planet. Anyone can connect
to the Internet with a computer and a valid Internet connection and browser. -
answertrue
Which of the following are challenges that IoT industry must overcome? -
answerSecurity and privacy, Interoperability and standards, Legal and regulatory
compliance, E-commerce and economic development.
Whih phenomenon helped drive near real-time, high-speed broadband connectivity to
the endpint device? - answerSocial media sharing
Which of the following requirements an IoT-connected automobile? - answerTraffic
monitoring sensors that provide real-time updates for traffic conditions
Which of the following are impacts of the IoT on our business lives? - answerE-
commerce, Integrated supply chain with front-end sales order entry, Companies now
offering delivery services for products and services with real-time updates, Customer
reviews providing consumers with product and services reviews online and with more
info about customer satisfaction.
Which of the following helps support remote teleworking? - answerPresence/availability,
IM chat, Video conferencing, collaboration
Which is a security challenges that IoT deployments must overcome? - answerSecure
communications with other IoT devices.
Unified messaging provides what functionality for users on the go? - answerVoice
messages that are converted to audio files and emailed to the user's emailbox for
playback while on the road.
Which of the following applications can eliminate the need for face-to-face training? -
answerCollaboration
Why do e-commerce systems need the utmost in security controls? - answerIt is a PCI
DSS standard, Private customer data is entedred into websites, Credit card data is
entered into websites, Customer retention requires confidence in secure online
purchases.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R344,79. You're not tied to anything after your purchase.