100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 267 Midterm 1-7 and Final 1-10 || very Flawless.

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
19-12-2024
Written in
2024/2025

1. The main goal of information security is to protect: A. non-public personally identifiable information B. confidentiality, integrity, and availability C. personal health data and biometrics D. financial data of public entities correct answers Answer: B Reference: p 4 2. All of the following are true with respect to cryptography except: A. hides information so unauthorized persons can't access it B. preserves confidentiality C. only used today by health care providers to protect health care data D. were used by the military to protect confidential communications correct answers Answer: C Reference: p 5 3. _______________ is the process of reviewing known vulnerabilities and threats. A. Risk avoidance B. Risk mitigation C. Risk analysis D. Risk engineering correct answers Answer: C Reference: p 16 4. What is the process of applying safeguards to avoid a negative impact? A. risk mitigation B. risk transfer C. risk analysis D. risk avoidance correct answers Answer: D Reference: p 16 5. ___________________ refers to applying safeguards designed to lower risks to a level deemed acceptable but without eliminating such risks. A. Residual risk B. Risk avoidance C. Risk mitigation D. Risk transfer correct answers Answer: C Reference: p 16 6.______________ means that only people with the right permission can access and use information. A. Authorized agent B. Confidentiality C. Integrity D. Encryption correct answers Answer: B Reference: p 5

Show more Read less
Institution
ITN 267
Module
ITN 267









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 267
Module
ITN 267

Document information

Uploaded on
December 19, 2024
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 267 Midterm 1-7 and Final 1-10 || very Flawless.
1. The main goal of information security is to protect:

A. non-public personally identifiable information
B. confidentiality, integrity, and availability
C. personal health data and biometrics
D. financial data of public entities correct answers Answer: B Reference: p 4

2. All of the following are true with respect to cryptography except:

A. hides information so unauthorized persons can't access it
B. preserves confidentiality
C. only used today by health care providers to protect health care data
D. were used by the military to protect confidential communications correct answers Answer: C
Reference: p 5

3. _______________ is the process of reviewing known vulnerabilities and threats.

A. Risk avoidance
B. Risk mitigation
C. Risk analysis
D. Risk engineering correct answers Answer: C Reference: p 16

4. What is the process of applying safeguards to avoid a negative impact?

A. risk mitigation
B. risk transfer
C. risk analysis
D. risk avoidance correct answers Answer: D Reference: p 16

5. ___________________ refers to applying safeguards designed to lower risks to a level
deemed acceptable but without eliminating such risks.

A. Residual risk
B. Risk avoidance
C. Risk mitigation
D. Risk transfer correct answers Answer: C Reference: p 16

6.______________ means that only people with the right permission can access and use
information.

A. Authorized agent
B. Confidentiality
C. Integrity
D. Encryption correct answers Answer: B Reference: p 5

, 7. All of the following are ways to protect confidentiality except:

A. encryption
B. access controls
C. passwords
D. shoulder surfing correct answers Answer: D Reference: p 6

8. _________________________ involves tricking other people into breaking security
procedures and sharing sensitive information.

A. Shoulder surfing
B. E-mail spam
C. Social engineering
D. Integrity correct answers Answer: C Reference: p 6

1._____________ is an individual's right to control the use and disclosure of his or her own
personal data.

A. Preference
B. Privacy
C. Integrity
D. Access correct answers Answer: B Reference: p 36

2. What is the source of legal authority for the U.S. government?

A. The First Amendment
B. Laws enacted by state Supreme Courts
C. The Fourth Amendment
D. The U.S. Constitution correct answers Answer: D Reference: p 38

3. Which of the following U.S. Constitution amendments contribute to the right of privacy?

A. First, Second, and Third Amendments
B. First and Sixth Amendments
C. First, Third, and Fourth Amendments
D. First, Second, and Fourth Amendments correct answers Answer: C Reference: p 38

4. __________________ is a body of law developed because of legal tradition and court cases.

A. Common law
B. Privacy law
C. Public law
D. Administrative law correct answers Answer: A Reference: p 44

5. A ______________ is some kind of wrongful act that harms or hurts a person.
£9.24
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
FullyFocus NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Follow You need to be logged in order to follow users or courses
Sold
734
Member since
3 year
Number of followers
437
Documents
34514
Last sold
1 day ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

110 reviews

5
46
4
20
3
22
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions