Preview

TEST 1

Satisfactory Essays
Open Document
Open Document
781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
TEST 1
• Question 1
0 out of 0.5 points A written plan for how to handle major disasters or outages and recover mission-critical systems, applications, and data is the definition of: Selected Answer:
Business Continuity Plan (BCP)
Correct Answer:
Disaster Recovery Plan (DRP) • Question 2
0.5 out of 0.5 points What name is given to a software review that identifies bugs or errors in software? Selected Answer:
Vulnerability assessment
Correct Answer:
Vulnerability assessment • Question 3
0.5 out of 0.5 points What is meant by second-level authentication? Selected Answer:
A second authentication requirement for users to gain access to more sensitive applications and data.
Correct Answer:
A second authentication requirement for users to gain access to more sensitive applications and data. • Question 4
0.5 out of 0.5 points In the field of information security, which of the following defines how the term availability is applied? Selected Answer:
A mathematical formula that quantifies the amount of uptime for a system compared to the amount of downtime, and usually displayed as a ratio or percentage.
Correct Answer:
A mathematical formula that quantifies the amount of uptime for a system compared to the amount of downtime, and usually displayed as a ratio or percentage. • Question 5
0 out of 0.5 points In which domain of a typical IT infrastructure do service level agreements (SLAs) figure prominently? Selected Answer:
Remote Access
Correct Answer:
WAN

• Question 6
0.5 out of 0.5 points What is ciphertext? Selected Answer:
The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable.
Correct Answer:
The opposite of cleartext. Data sent as ciphertext is not visible and not decipherable. • Question 7
0.5 out of 0.5 points What term refers to ensuring the latest software revisions,

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Privileged Users will be presented the ROB for Users with Privileged Access to Information Systems. Non-Privileged Users are required to select the appropriate ROB at first login per database prior to receiving access to the application. If a user elects to decline the ROB, access to…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    References: Ballad, B. Ballad, T. and Banks, Erin. Access Control, Authentication, and Public Key Infrastructure. 2011. Jones and Bartlett Learning…

    • 575 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing a second level identity check to gain access to sensitive systems, applications, and data; you can protect from unauthorized access to the systems, applications, and data.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    mandatory and discretionary access control policies. ACM Transactions on Information and System Security, Vol. 3, No. 2.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Week 5 Bsa/310

    • 4336 Words
    • 18 Pages

    Take the following analogy as an example: A single workstation computer. No network card. This workstation is in a sealed room with no windows, only a single overhead halogen light and a single ventilation duct. There is an armed guard who verifies the user upon entrance to the foyer of the sealed room. To get into the sealed room requires a fingerprint scan, a retinal scan, and voice recognition. Once inside, there is only one user in the world that is authorized and has access to this computer. To log in to the system, the user must log in using biometrics and a password.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Current Ratio

    • 834 Words
    • 3 Pages

    A ratio showing how many times a company's inventory is sold and replaced over a period. The days in the period can then be divided by the inventory turnover formula to calculate the days it takes to sell the inventory on hand or "inventory turnover days."…

    • 834 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Palm Vein Technology

    • 256 Words
    • 2 Pages

    As we increasingly rely on computers and other machines in our daily lives, ensuring the security of personal information and assets becomes more of…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    the number of failures (Nf) and the mean down time (MDT), see the scales in the remainder.…

    • 1038 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    2.1.2 Cryptography Facts

    • 665 Words
    • 3 Pages

    Cipher text is the message in a form that makes it unreadable to all but those for whom the message was intended.…

    • 665 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cryptography is the science of hiding information in plain sight, in order to conceal it from unauthorized parties.…

    • 1364 Words
    • 6 Pages
    Powerful Essays