Preview

Nt1310 Final Exam

Good Essays
Open Document
Open Document
3599 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Final Exam
1. Which of the following statements is true?
a. The concept of defense-in-depth reflects the fact that security involves the use of a few sophisticated technical controls. (Incorrect. The concept of defense-in-depth is based on the idea that, given enough time and resources, any single control, no matter how sophisticated, can be overcome—therefore, the use of redundant, overlapping controls maximizes security.) b. Information security is necessary for protecting confidentiality, privacy, integrity of processing, and availability of information resources. (Correct. As Figure 8-2 shows, security is the foundation for achieving the other four components of system reliability.)
c. The time-based model of security can be expressed in the following formula: P < D + C
…show more content…

All of the above are true. (Correct. All three statements are true.)

10. Which of the following can organizations use to protect the privacy of a customer’s personal information when giving programmers a realistic data set with which to test a new application?
a. digital signature (Incorrect. A digital signature is used for nonrepudiation. However, because it is an encrypted hash, it cannot be used to test programming logic.)
b. digital watermark (Incorrect. A digital watermark is used to identify proprietary data, but it does not protect privacy.)
c. data loss prevention (Incorrect. Data loss prevention is designed to protect confidentiality by filtering outgoing messages to prevent sensitive data from leaving the company.) d. data masking (Correct. Masking replaces actual values with fake ones, but the result is still the same type of data, which can then be used to test program logic.)

1. Which of the following is a characteristic of auditing?
a. Auditing is a systematic, step-by-step process. (Incorrect. While this is true, it is not the only correct answer.)
b. Auditing involves the collection and review of evidence. (Incorrect. While this is true, it is not the only correct


You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) Which of the following is the best description of the defense in depth strategy? B) Using multiple layers of security controls to protect resources.…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 1 Study Guide

    • 378 Words
    • 2 Pages

    If the multithreading scheme replicates all of the software-visible state, including privileged control registers and TLBs, then it enables _________ to be created for each thread.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Mat 540 Week 4 Paper

    • 1775 Words
    • 8 Pages

    * Provide a set of values that will test the normal operation of this program segment. Defend your choices.…

    • 1775 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    o Provide a set of test values that test the abnormal operation of this program segment.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This Is a Paper

    • 469 Words
    • 2 Pages

    Provide a set of values that will test the normal operation of this program segment. Defend your choices.…

    • 469 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    JOUR 371 chapter notes

    • 2505 Words
    • 11 Pages

    C. Pushback stemming from privacy concerns comes in the form of people not knowing they have given consent or objecting when they discover that information about them they thought was private is, in…

    • 2505 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Quiz

    • 4549 Words
    • 19 Pages

    QUESTION: 1 Which of the following audit findings would have the least impact (either positive or negative) on a department's control environment?…

    • 4549 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    When auditing a public company, the auditor must form an opinion on the effectiveness of internal control…

    • 11346 Words
    • 62 Pages
    Powerful Essays
  • Satisfactory Essays

    Acct Stuff

    • 330 Words
    • 2 Pages

    1. For each of the following specific audit procedures, indicate the type of audit procedure it represents: (1) inspection of records or documents, (2) inspection of tangible assets, (3) observation, (4) inquiry, (5) confirmation, (6) recalculation, (7) reperformance, (8) analytical procedures, and (9) scanning.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Homework Assignment Week 1

    • 1195 Words
    • 4 Pages

    D. One purpose of establishing quality control policies and procedures for deciding whether to accept a new client is to…

    • 1195 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    3. Research is the division where information security is critical, as it is discussed in the case that loss of this information can cause loss of competitive advantage.…

    • 511 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Security in Computing

    • 498 Words
    • 2 Pages

    3. Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, interception, modification, and fabrication. How do the first three concepts relate to the last four? That is, is any of the four equivalent to one or more of the three? Is one of the three encompassed by one or more of the four?…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained.…

    • 2188 Words
    • 9 Pages
    Good Essays