100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 267 Book 1,2,3,4,5 Flashcards _ 100- vSURE ANSWERS.pdf

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
04-08-2024
Written in
2024/2025

ITN 267 Book 1,2,3,4,5 Flashcards _ 100- vSURE ANSWERS.pdf

Institution
CGFM - Certified Government Financial Manager
Course
CGFM - Certified Government Financial Manager










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CGFM - Certified Government Financial Manager
Course
CGFM - Certified Government Financial Manager

Document information

Uploaded on
August 4, 2024
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

8/4/24, 12:31 PM



ITN 267 Book 1,2,3,4,5
Jeremiah
Terms in this set (125)

A ________ is a method of controlled entry mantrap
into a facility and provides access to secure
areas such as a research lab or data center.


key-card
mantrap
video surveillance system
technical safeguard

A single point of failure is a piece of the functioning of the entire system
hardware or application that is key to
________________________.


specifying how long systems may be offline
before an organization starts to lose money
the success of safeguards
ensuring that individuals with proper
permission can use systems and retrieve
data in a dependable manner
the functioning of the entire system

All of the following are ways to protect shoulder surfing
confidentiality except:


encryption
access controls
passwords
shoulder surfing

In which of the following types of phone calls
communication is phishing least likely to
occur?


phone calls
email


ITN 267 Book 1,2,3,4,5




instant messages
chat rooms


1/19

,8/4/24, 12:31 PM
_ ________ is the process of reviewing known Risk analysis
vulnerabilities and threats.


Risk avoidance
Risk mitigation
Risk analysis
Risk engineering

_ __________ refers to applying safeguards Risk mitigation
designed to lower risks to a level deemed
acceptable but without eliminating such
risks.


Residual risk
Risk avoidance
Risk mitigation
Risk transfer

_ ______________ involves tricking other Social engineering
people into breaking security procedures
and sharing sensitive information.


Shoulder surfing
E-mail spam
Social engineering
Integrity

What is the window of vulnerability? the time between exploit discovery and an installed security patch


the period of time when antivirus software
must be updated
the period of time when an attacker may
launch a DoS attack
the time between a malware attack and
discovery by security personnel
the time between exploit discovery and an
installed security patch




ITN 267 Book 1,2,3,4,5
https://quizlet.com/ca/835106064/itn-267-book-12345-flash-cards/ 2/19

, 8/4/24, 12:31 PM
What situation would be an example of an An art thief sneaks into a museum and steals a famous painting and then sneaks out of
exploit? the museum without being caught by security because the thief identified and traveled
through the museum via blind spots of the museum's security cameras. After the
A major league baseball pitcher takes his incident, the museum increases the number of security guards and cameras guarding
daughter to a carnival and plays a game the museum at all times.
wherein he can earn prizes if he can use a
beanbag to knock over all of the cans
stacked in a pyramid formation in the game's
booth. In each of the 10 rounds of the
carnival game that the pitcher plays, he
knocks down all the cans, and he wins his
daughter the largest stuffed animal prize in
the booth.


An art thief sneaks into a museum and steals
a famous painting and then sneaks out of the
museum without being caught by security
because the thief identified and traveled
through the museum via blind spots of the
museum's security cameras. After the
incident, the museum increases the number
of security guards and cameras guarding the
museum at all times.


A film reel catches fire in the middle of a
crowded showing of a popular new release
film. The film is ruined. Due to the cinema's
policy, all of the people in that audience
receive refunds for the price of their tickets.


A man discovers someone's lost wallet.
When the man attempts to use the credit
cards found in the wallet, he finds that they
have been reported as stolen and he is
unable use the cards to carry out any
transactions.

Which of the following statements More people are interested in information security, and have developed the skills to
summarizes why the window of vulnerability find new vulnerabilities.
is shrinking?


People are getting better at enduring and
recovering from exploits.


There are also fewer people with the skills
needed to create vulnerabilities.


More people are interested in information
security, and have developed the skills to
find new vulnerabilities.


People are not inclined to attack
vulnerability for financial gain.




ITN 267 Book 1,2,3,4,5
https://quizlet.com/ca/835106064/itn-267-book-12345-flash-cards/ 3/19

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Denyss Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
24
Member since
1 year
Number of followers
3
Documents
6307
Last sold
1 week ago
Classic Writers

I am a professional writer/tutor. I help students with online class management, exams, essays, assignments and dissertations. Improve your grades by buying my study guides, notes and exams or test banks that are 100% graded

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions