Preview

it255 study guide

Powerful Essays
Open Document
Open Document
659 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
it255 study guide
FINAL EXAM: Study Guide

1. Which of the following is an action that could damage an asset?

2. Which law requires all types of financial institutions to protect customers’ private financial information?

3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality?

4. Which of the following is a detailed written definition of how software and hardware are to be used?

5. Which of the following is not a common type of data classification standard?

6. What does a lapse in a security control or policy create?

7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm?

8. Which of the following terms refers to the likelihood of exposure to danger?

9. Which type of attacker intends to be helpful?

10. Which domain is primarily affected by weak endpoint security on a VPN client?

11. Identify two phases of the access control process.

12. You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following?

13. Which of the following is a type of authentication?

14. Identify an example of an access control formal model.

15. Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition?

16. Which of the following are primary categories of rules that most organizations must comply with?

17. Which of the following is not a part of an ordinary IT security policy framework?

18. Which of the following helps you determine the appropriate access to classified data?

19. Which of the following refers to the management of baseline settings for a system device?

20. Identify a primary step of the SDLC.

21. Which of the following is a process to verify policy compliance?

22.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following Linux utilities lists the names of files in a single directory?…

    • 2385 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    15. Which of the following access control models is based on a mathematical theory published in 1989 to ensure fair competition?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    a. You input information perhaps via a keyboard or mouse to the computer and you receive output via a monitor or printer or some such device…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Good Essays

    comply with them. They must also be reviewed and updated regularly as the needs of the…

    • 3990 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    ISS 315 studyguide

    • 1183 Words
    • 7 Pages

    8. River divides the unglaciated不被冰冻的 part of the European lowland in the south from the glaciated被冰冻的 plains in the north?…

    • 1183 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    2. Which among the following is the process of proving that provided identity credentials are valid and…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    2. ____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a. Spoofing c. Phishing b. Unauthorized access d. Vandalizing 3. ____ refers to the act of breaking into a computer or network. a. Spamming c. Hacking b. Phishing d. Spoofing 4. Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing c. spamming b. phishing d. war driving 5. ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object c. Two-factor b. Possessed object d. Biometric 6. A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse c. hub b. firewall d. bridge 7. ____ uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption c. Public key encryption b. Asymmetric key encryption d. Synchronous key encryption 8. Some Web-based encrypted e-mail system, such as the popular free ____ service梤 equire both the sender and recipient to have accounts through that system. a. CryptMail c. HushMail b. QuietMail d. PrivateMail…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ITP 310 Study Guide

    • 638 Words
    • 3 Pages

    Example: Email Programs would need: messages (subject, recipient, sender, time and date, content), contacts, message folders (inbox, outbox, drafts, etc.)…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Costs and Price

    • 1595 Words
    • 7 Pages

    12. Because the goals of firms, entrepreneurs, and workers have different incentives, which of the following principles applies?…

    • 1595 Words
    • 7 Pages
    Good Essays
  • Good Essays

    u6 assessment

    • 2424 Words
    • 8 Pages

    a. Describe the rights of a range of individuals who have one or more of the 9 protected characteristics in the organisation/service you work for (or one that you are familiar with).…

    • 2424 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Information technology advances in order to keep up with the demands of the modern world. One such way, is the availability to access money from automated tellers and point of sale terminals. “Congress implemented the Electronic Funds Transfer Act in 1978 to establish the basic rights, liabilities and responsibilities of consumers who use electronic funds services and financial institutions who offer those services.” (FDIC, 2006). This law protects an individual consumer’s privacy by ensuring the financial institution protects the digital data it is storing and that it does not disseminate that information to the wrong individual. The financial institution must ensure it receives and authentic information from the consumer and accurately transfer the information into the computer system. “The ETA also identifies error resolution and limits liability for any unauthorized transactions “(FDIC, 2006).…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 3

    • 471 Words
    • 2 Pages

    9. __________ define the procedures that different computers follow when they transmit and receive data…

    • 471 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hey Is This Enough

    • 274 Words
    • 2 Pages

    The concept of situational crime prevention suggests that desperate people may contemplate crime, but only the truly ____ will attack a well-defended, inaccessible target and risk strict…

    • 274 Words
    • 2 Pages
    Good Essays