100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ITM 450|266 Exam 1 Review |Master Basics Questions And Answers €8,26   In winkelwagen

Tentamen (uitwerkingen)

ITM 450|266 Exam 1 Review |Master Basics Questions And Answers

 6 keer bekeken  0 keer verkocht
  • Vak
  • ITM 450
  • Instelling
  • ITM 450

____________ refers to keeping information confidential that is personally identifiable or which might cause harm, embarrassment, or disgrace to someone if revealed. - ️️Privacy A main objective of awareness training is: - ️️Provide understanding of responsibilities A portion of the _____...

[Meer zien]

Voorbeeld 3 van de 20  pagina's

  • 12 september 2024
  • 20
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ITM 450
  • ITM 450
avatar-seller
____________ refers to keeping information confidential that is personally identifiable or which might
cause harm, embarrassment, or disgrace to someone if revealed. - ✔ ✔ Privacy

A main objective of awareness training is: - ✔ ✔ Provide understanding of responsibilities

A portion of the ______________ is the logical and practical investigation of business pro- cesses and
organizational policies. This process/policy review ensures that the stated and implemented business
tasks, systems, and methodologies are practical, efficient, cost-effec- tive, but most of all (at least in
relation to security governance) that they support security through the reduction of vulnerabilities and
the avoidance, reduction, or mitigation of risk. - ✔ ✔ Risk aversion process

A risk management project may be subject to overlooking certain types of threats. What can assist the
risk management team to prevent that? - ✔ ✔ Automated tools

A security program cannot address which of he following business goals? - ✔ ✔ Accuracy of
Information

A Type B fire extinguisher may use all except which of the following suppression mediums? - ✔ ✔
Water

Acme Widgets currently uses a 1,024-bit RSA encryption standard companywide. The company plans to
convert from RSA to an elliptic curve cryptosystem. If it wants to maintain the same cryptographic
strength, what ECC key length should it use? - ✔ ✔ 160 bits

Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key
should she use to encrypt the message? - ✔ ✔ Bob's public key

All but which of the following items requires awareness for all individuals affected? - ✔ ✔ The
backup mechanism used to retain email messages

An information security policy does NOT usually include: - ✔ ✔ Guidelines for how to implement
policy

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20

,years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Mark the tapes before sending them to the warehouse.

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20
years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Record retention

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20
years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Use a secure offsite storage facility.

An organization is implementing a preselected baseline of security controls, but finds not all of the
controls apply. What should they do? - ✔ ✔ Tailor the baseline to their needs

At what voltage level can static electricity cause destruction of data stored on hard drives? - ✔ ✔
1,500

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key
should he use to decrypt the message? - ✔ ✔ Bob's private key

Data classification can assist an organization in: - ✔ ✔ Reducing costs for protecting data

Data classifications are used to focus security controls over all but which of the following? - ✔ ✔
Layering

Dave is developing a key escrow system that requires multiple people to retrieve a key but does not
depend on every participant being present. What type of technique is he using? - ✔ ✔ M of N
control

, Ensure important datasets are developed, maintained, and accessible within their defined specifications.
- ✔ ✔ Data custodians

Entails analyzing the data that the organization retains, determining its importance and value, and then
assigning it to a category. - ✔ ✔ Data classification

For what type of information system security accreditation are the applications and systems at a
specific, self-contained location evaluated? - ✔ ✔ Site accreditation

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What goal of cryptography is Gina seeking to achieve by applying the digital signature? - ✔ ✔ Non-
repudiation

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Eric use to validate the digital signature? - ✔ ✔ Gina's public key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Gina use to create the digital signature? - ✔ ✔ Gina's private key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Gina use to encrypt the message payload? - ✔ ✔ Eric's public key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

√  	Verzekerd van kwaliteit door reviews

√ Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, Bancontact of creditcard voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper jackline98. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €8,26. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 75323 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€8,26
  • (0)
  Kopen