100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CMIT425 Final Quiz Bank (QUESTIONS & ANSWERS)

Beoordeling
-
Verkocht
-
Pagina's
140
Cijfer
A+
Geüpload op
23-02-2022
Geschreven in
2021/2022

An exposure occurs when a vulnerability _____________. View Feedback Question 2 2 / 2 points Confidentiality is the principle that _____________. View Feedback Question 3 0 / 2 points Risk can be reduced by _____________. View Feedback Your quiz has been submitted successfully. creates the possibility of incurring a loss or experiencing harm. is reported to authorities as a source of risk. is discovered by a penetration testing team. is published in the Common Vulnerabilities and Exposures (CVE) database. is lost when hackers break into a database. ensures data security. ensures required levels of secrecy during processing, transmission, storage, and use of information. ensures privacy of information. applying countermeasures to eliminate threats and threat agents. moving data from cloud servers to physical servers owned and operated by the company. moving data from physical servers to cloud-based servers. applying countermeasures to eliminate vulnerabilities.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Your quiz has been submitted successfully.


Domain 1 Easy

Question 1 points

An exposure occurs when a vulnerability _____________.

creates the possibility of incurring a loss or experiencing harm.
is reported to authorities as a source of risk.

is discovered by a penetration testing team.

is published in the Common Vulnerabilities and Exposures (CVE) database.

View Feedback


Question 2 points

Confidentiality is the principle that _____________.

is lost when hackers break into a database.

ensures data security.
ensures required levels of secrecy during processing, transmission, storage, and
use of information.

ensures privacy of information.

View Feedback


Question 3 points

Risk can be reduced by _____________.

applying countermeasures to eliminate threats and threat agents.
moving data from cloud servers to physical servers owned and operated by the
company.

moving data from physical servers to cloud-based servers.

applying countermeasures to eliminate vulnerabilities.

View Feedback

,Question 4 points

A control is _____________

used to impose penalties for misuse of confidential information.

used to eradicate the impact of an attack.

used to reduce or mitigate risks.

a mechanism for locking down configurations to prevent patching.

View Feedback


Question 5 points

Hashing is a control that _______


maps to the Integrity component of the AIC triad.
maps to the Availability and Confidentiality component of the AIC triad.

maps to the Confidentiality component of the AIC triad.
maps to the Integrity and Confidentiality components of the AIC triad.

View Feedback


Question 6 points

________ is a legal principle that requires that individuals perform necessary actions to
prevent negligence from occurring. It is judged using the reasonable person standard.

Due care

Separation of duties
Due diligence
Customary law

View Feedback


Question 7 points

Which of the following statements is true?

, PCI-DSS is a federal law that protects the privacy of credit card transactions.
USA Patriot Act broadens privacy protections for federal law enforcement agents
and immigration authorities.
HIPAA applies to all medical information held and used by hospitals and doctors'
offices.

FISMA applies to federal agencies and their contractors.

View Feedback


Question 8 points

Clustering and load balanging are controls that ________


map to the Availability and Integrity components of the AIC triad.

map to the Network Infrastructure component of the AIC triad.
map to the Availability component of the AIC triad.
map to the Network Integrity component of the AIC triad.


View Feedback


Question 9 points

Balanced security refers to _____________


addressing threats and implementing controls for availability, integrity, and
confidentiality.
understanding the concepts of the AIC triad.
weighing choices in controls against the magnitude of risk presented by a variety
of threats.

mapping controls to the AIC triad.

View Feedback


Question 10 points

Confidentiality can be protected by implementing which of the following controls?

, Data hiding and data obscuring techniques.

Access controls and auditing controls.
Encrypting data at rest and in transit.

Software digital signing to verify recipients.

View Feedback


Question 11 points

Availability is the principle which ensures ____________.

access to data and networks

the right information is sent to the right people at the right time.
reliability and timely access to data and other resources by authorized individuals.

required business systems have better than 99.999% uptime.


View Feedback


Question 12 points

Which of the following guidance documents specifically addresses security controls
required for information systems owned by or operated for the U.S. Federal
Government?

COBIT 5

NIST SP-800-53
DoDAF

NIST SP-800-37

View Feedback


Question 13 points

What is "security through obscurity?"

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
23 februari 2022
Aantal pagina's
140
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Michael01 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
467
Lid sinds
5 jaar
Aantal volgers
344
Documenten
0
Laatst verkocht
9 maanden geleden

4.1

127 beoordelingen

5
68
4
27
3
14
2
9
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen