100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ITSY 1300 Exam Revision Questions with 100% Correct Answers

Puntuación
-
Vendido
-
Páginas
38
Grado
A+
Subido en
24-10-2025
Escrito en
2025/2026

ITSY 1300 Exam Revision Questions with 100% Correct Answers

Institución
ITSY 1300
Grado
ITSY 1300











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ITSY 1300
Grado
ITSY 1300

Información del documento

Subido en
24 de octubre de 2025
Número de páginas
38
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ITSY 1300 Exam Revision Questions with 100%
Correct Answers
The tasks of securing information that is in a digital format, whether it be manipulated by

a microprocessor, preserved on a storage device, or transmitted over a network is called:

Information Security

What are the three protections that must be extended over information?

CIA-



Confidentiality, Integrity, Availability

__________ ensures that only authorized parties can view the information.

Confidentiality

__________ ensures that the information is correct and no unauthorized person or

malicious software has altered the data.

Integrity

__________ ensures that the data is accessible to authorized users.

Availability

An _________ is an item that has value.

Asset

A type of action that has the potential to cause harm is known as a:

Threat

,A flaw or weakness that allows a threat agent to bypass security is a:

Vulnerability

A situation that involves exposure to some type of danger is a:

Risk

What are the 4 responses to risks?

Accept

Transfer

Avoid

Mitigate

To __________ risk simply means that the risk is acknowledged but no steps are taken to

address it.

Accept

A response to risk that allows a 3rd party to assume the responsibility of the risk is known

as risk:

Transfer

To __________ risks, involves identifying the risk but making the decision to not engage in

the activity.

Avoid

To __________ risk is the attempt to address risk by making risk less serious.

Mitigate

,Healthcare enterprises must guard protected healthcare information and implement

policies and procedures to safeguard it, whether in paper or electronic format:

HIPAA



Health Insurance Portability and Accountability Act 1996

Set of security standards that all companies that process, store, or transmit credit or debit

card information must follow:

PCI DSS



Payment Card Industry Data Security Standard

__________ is attacks that are intended to cause panic or provoke violence among citizens,

attacks directed at the banking industry, military installations, power plants, air traffic

control centers, and water systems.

Cyberterrorism

Individuals who want to attack computers yet they lack the knowledge of computers and

networks needed to do so are:

Script Kiddies

Freely available automated attack software used by Script Kiddies is known as:

Open-Source Intelligence

A group of threat actors that is strongly motivated by ideology are known as:

, Hactivists



Protest or Retaliatory attacks

A new class of attack that uses innovative attack tools to infect a system and then silently

extracts data over an extended period is known as:

APT



Advanced Persistent Threat

APTs are most commonly associated with:

Nation State Actors

State sponsored attackers employed by a government for launching computer attacks

against their foes are known as:

Nation State Actors

When the U.S. hired the Israel government to help infiltrate the Iranian nuclear program,

or if they hired Logan's Exodus to do it, they would be known as:

Nation State Actors

What are the 5 fundamental security principles for defense?

Layering

Limiting

Diversity
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
KenAli West Virginia University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
84
Miembro desde
1 año
Número de seguidores
5
Documentos
17177
Última venta
2 semanas hace

2.9

19 reseñas

5
4
4
4
3
4
2
0
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes