Every Question
Save
Terms in this set (24)
Information security is True; Information security is specifically focused on
specific to securing protecting the information, while Information Systems
information, whereas Security is the collection of activities that protect the
information systems information system and the data stored in it.
security is focused on the
security of the systems that
house the information.
The ___ tenet of information Availability. The Recovery Time Objective or RCO is the
systems security is amount of time it takes to recover a system after an
concerned with the outage, and this time correlates with the Availability of
recovery time objective. the company
Which of the following - Email filtering and quarantining
security controls can help - Email attachment anti virus scanning
mitigate malicious email - Verifying with users that email source is reputable
attachments? - Holding all inbound emails with unknown attachments
The ___ is the weakest link in The user is the weakest link of an IT infrastructure due to
an IT infrastructure. human error and uneducated users.
You can help ensure A virtual private network for remote access. Encryption
confidentiality by by VPN would be the safest way to ensure
implementing ___. confidentiality.
Five Key Challenges that the IoT. Must overcome.
Which of the following are
Security, Privacy, Interoperability, and standards. Legal
challenges that IoT industry
and regulatory compliance and E-commerce and
must overcome?
economic development issues
Traffic monitoring sensors that provide real-time
Which of the following updates for traffic conditions. pg. 53 mentions how cars
requires an IoT-connected with smart computers have "always on" Wi-Fi internet,
automobile? and pg. 55 mentions how this phenomenon can monitor
and report on real-time traffic.