8/1/24, 2:40 PM 1/7 and how the provider protects that information. Zacks ISM 6574 Final Jeremiah Terms in this set (81) SP 800-161 organizes security controls for SCRM into which of the following categories? All of the above 3 multiple choice options Which of the following is NOT a category that SP 800-161 organizes security controls for SCRM into? Rapid Elasticity 3 multiple choice options Which of the following is NOT a security control of the provenance family? Security management for provenance 3 multiple choice options The security controls of the provenance family that provides guidance for implementing a provenance policy. Provenance policy and procedures 3 multiple choice options Which of the following is NOT a service model of cloud computing, according to NIST? Private cloud as a service 3 multiple choice options In this model, the consumer can use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser. Software as a service 3 multiple choice options Some of the threats to cloud service users are: All of the above 3 multiple choice options This arises from the fact that cloud service users consume delivered resources through service models, thereby making the customer -built IT system dependent on those services. Responsibility ambiguity 3 multiple choice options These policies describe the different types of information collected; how that information is used, disclosed, and shared; Privacy policies 3 multiple choice options Zacks ISM 6574 Final 8/1/24, 2:40 PM Zacks ISM 6574 Final https://quizlet.com/926482121/zacks -ism-6574 -final-flash -cards/ 2/7 This section prohibits activities that providers consider to be improper or outright illegal uses of their service. Conversely, the provider usually agrees not to violate the intellectual property rights of the customer. Acceptable use policy 3 multiple choice options One of the key characteristics of a security architecture include the models and principles show where to take which type of measures, when the principles are applicable, and how the principles connect with other principles True 1 multiple choice option Which of the following is NOT a key characteristic of a security architecture It must be capable of identifying common types of malware as well as attacker tools 3 multiple choice options Which of the following is NOT a good malware software capability of SP 800-83 All of the above are capabilities 3 multiple choice options SP 800-83 indicates that good malware software has the following capabilities: It must scan each file for known malware. Anti-malware software on hosts should be configured to scan all hard drives regularly to identify any file system infections and, optionally, depending on organization security needs, to scan removable media inserted into the host before allowing its use 3 multiple choice options Which of the following is one of the best practices for avoiding common security mistakes with IAM? All of the above 3 multiple choice options Which of the following is NOT one of the best practices for avoiding common security mistakes with IAM? Deploy multifactor authentication judiciously 3 multiple choice options Regular expressions, keywords, and other basic pattern -matching techniques are best suited for basic structured data, such as credit card numbers and Social Security numbers. This technique efficiently identifies data blocks, files, database records, and so on that contain easily recognized sensitive data. This is known as: Rule-based 3 multiple choice options This technique looks for a partial match on a protected document. It involves the use of multiple hashes on portions of the document, such that if a portion of the document is extracted and filed elsewhere or pasted into an email, it can be detected. This technique is known as: Partial document matching 3 multiple choice options This refers to the original message or data block that is fed into the algorithm as input. Plaintext 3 multiple choice options Symmetric encryption has which of the following ingredients? All of the above 3 multiple choice options
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $6.99. You're not tied to anything after your purchase.