100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Identifying Threats and Vulnerabilities in an IT Infrastructure Review Questions with complete Solutions Rated A+

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
11-10-2024
Written in
2024/2025

Identifying Threats and Vulnerabilities in an IT Infrastructure Review Questions with complete Solutions Rated A+ Which of the listed risks, threats, or vulnerabilities can violate HIPAA privacy and security requirements? - Answers Unauthorized Access to Organization-Owned Workstations the risks, threats, or vulnerabilities that violate HIPAA security and privacy standard the most because data must not be shared with anyone without the consent of the patient. Organizations that handles HIPPA must protect the data and the system. Unauthorized access from public Internet - Answers WAN Domain Hacker penetrates IT infrastructure through modem bank - Answers LAN-to-WAN Domain Communication circuit outages - Answers WAN Domain Workstation operating system (OS) has a known software vulnerability - Answers Workstation Domain Denial of service attack on organization's e-mail server - Answers System Application Domain Remote communications from home office - Answers Remote Access Domain Workstation browser has software vulnerability - Answers Workstation Domain Weak ingress/egress traffic-filtering degrades performance - Answers LAN-to-WAN Domain Wireless Local Area Network (WLAN) access points are needed for LAN connectivity within a warehouse - Answers LAN Domain Need to prevent rogue users from unauthorized WLAN access - Answers LAN-to-WAN Domain Doctor destroys data in application, deletes all files, and gains access to internal network - Answers System/Application Domain Fire destroys primary data center - Answers System Application Domain Intraoffice employee romance gone bad - Answers User Domain Loss of production data server - Answers System Application Domain Unauthorized access to organization-owned workstations - Answers Workstation Domain LAN server OS has a known software vulnerability - Answers LAN Domain Nurse downloads an unknown e-mail attachment - Answers User Domain Service provider has a major network outage - Answers WAN Domain A technician inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers - Answers User Domain Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router - Answers Remote Access Which domain(s) had the greatest number of risks, threats, and vulnerabilities? - Answers System Application Domain had 4 risks, threats, and vulnerabilities and Workstation Domain had 4. What is the risk impact or risk factor that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the health care and HIPAA compliance scenario? - Answers Hacker penetrates IT infrastructure through modem bank - High, Weak ingress/egress traffic-filtering degrades performance - Medium, Need to prevent rogue users from unauthorized WLAN access - High, Unauthorized access to organization-owned workstations - High

Show more Read less
Institution
IT Infrastructure
Course
IT Infrastructure








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT Infrastructure
Course
IT Infrastructure

Document information

Uploaded on
October 11, 2024
Number of pages
3
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Identifying Threats and Vulnerabilities in an IT Infrastructure Review Questions with complete
Solutions Rated A+

Which of the listed risks, threats, or vulnerabilities can violate HIPAA privacy and security requirements?
- Answers Unauthorized Access to Organization-Owned Workstations the risks, threats, or vulnerabilities
that violate HIPAA security and privacy standard the most because data must not be shared with anyone
without the consent of the patient. Organizations that handles HIPPA must protect the data and the
system.

Unauthorized access from public Internet - Answers WAN Domain

Hacker penetrates IT infrastructure through modem bank - Answers LAN-to-WAN Domain

Communication circuit outages - Answers WAN Domain

Workstation operating system (OS) has a known software vulnerability - Answers Workstation Domain

Denial of service attack on organization's e-mail server - Answers System Application Domain

Remote communications from home office - Answers Remote Access Domain

Workstation browser has software vulnerability - Answers Workstation Domain

Weak ingress/egress traffic-filtering degrades performance - Answers LAN-to-WAN Domain

Wireless Local Area Network (WLAN) access points are needed for LAN connectivity within a warehouse
- Answers LAN Domain

Need to prevent rogue users from unauthorized WLAN access - Answers LAN-to-WAN Domain

Doctor destroys data in application, deletes all files, and gains access to internal network - Answers
System/Application Domain

Fire destroys primary data center - Answers System Application Domain

Intraoffice employee romance gone bad - Answers User Domain

Loss of production data server - Answers System Application Domain

Unauthorized access to organization-owned workstations - Answers Workstation Domain

LAN server OS has a known software vulnerability - Answers LAN Domain

Nurse downloads an unknown e-mail attachment - Answers User Domain

Service provider has a major network outage - Answers WAN Domain

A technician inserts CDs and USB hard drives with personal photos, music, and videos on organization-
owned computers - Answers User Domain

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
342
Member since
1 year
Number of followers
16
Documents
28610
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions