100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CIST 1601 Final Exam Questions and Correct Solutions Latest Update (Graded A+)

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
13-12-2024
Written in
2024/2025

CIST 1601 Final Exam Questions and Correct Solutions Latest Update (Graded A+) Cleartext is a name for text that appears to be transparent or invisible during a data transmission. - Answers False A threat is any action or actor that could damage an asset. - Answers True One of the functions of a EULA is to protect the software vendor from liability. - Answers True The standard CIA triangle consists of Confidentiality, Integrity, and Authorization. - Answers False An example of cryptography is to encrypt data, thus producing ciphertext - Answers True To make the process of information security more manageable, an typical IT infrastructure is often dived into nine domains. - Answers False Different communication protocols, firewalls, routers, and VPNs are components commonly managed within the WAN domain. - Answers True The user is often the weakest link in IT infrastructure security. - Answers True Private, Confidential, Internal Use Only, and Public Domain are four common government data classification standards. - Answers False A common information security acronym is AUP, which stands for Authorized User Practices. - Answers False The IoT is a concept dealing with the growing interconnectivity of almost everything over the Internet (which means almost everything may be vulnerable to security issues). - Answers True RFID allows the embedding of small communication devices within goods to keep track of inventory. - Answers true Data Analytics, Cloud Computing, and acceptance of TCP/IP as a global standard have had minimal effect on the growth of IOT. - Answers false SaaS (Software anytime anywhere Standards) is the leading standard for anywhere anytime software service. - Answers false When done properly, SEO will help drive customers to a company's website. - Answers true Smart homes, health monitoring, smart automobiles, and GPS are all prime examples of IoT technology. - Answers true BYOD strategy is often less expensive for a company AND it reduces a company's security risk. - Answers false Mobile IP allows a smartphone to function as a stationary Internet device even though the phone is moving from one mobile cell to another. - Answers true Metadata is the collected primary data (things like name, address, and phone #) from millions of customer records. - Answers false Developing interoperabiity and Standard of IoT devices will mean that almost everything will be able to to talk to almost everything else, and thus may be less expensive for the manufacturer to support. But if a manufacturer waits too long to bring a product to market, the manufacturer runs the risk of losing market share to a competitor. - Answers true Drug formulas, engineering plans, and patents are all examples of intellectual property. - Answers true A white-hat hacker probably has the permission of a company to do penetration testing. - Answers true OS fingerprint scanners, vulnerability scanners, and keystroke loggers are all examples of common attack tools. - Answers true A port scanner is a specialized type of monitoring tool used to examine packages at shipping yards on the east, west, and southern coasts of the United States. - Answers false A dictionary attack consists of attempting to break into a user's account by trying all possible combinations of letters, numerals, and special characters to guess the user's password. - Answers false DoS stands for Distributed online Services. - Answers false Passive wiretapping will look at data transmission without altering the data, while active wiretapping will try to change the data. - Answers true A rootkit gets its name from the attacker having to obtain root or system privileges to install the rootkit. - Answers true ARP poisoning relies primarily on changing the IP address of the person sending an IP packet - Answers false Breaking into computer system A, and then using system A to launch an attack on against computer system B (which trusts system A) is called a transitive attack - Answers true Vulnerability = Risk X Threat - Answers false A Risk Register is a detailed description of all the identified risks. - Answers true The following represents a logical order of research and document production. BCP leads to DRP which leads to BIA - Answers false An RTO is the maximum amount of data loss that is acceptable. - Answers false Terrorism, Utility Outages, and Tornadoes are all considered valid and standard types of threats. - Answers true An impact scenario is an analysis of the strategy required to restore normal business functions after a disruption of the business. The scenario could range all the way from loss of a specific computer or computer room to the loss of an entire building. - Answers true Cold sites, warm sites, and hot sites are all strategies for restoring the operation of a data center after the data center has been destroyed by a disaster. - Answers true A full-interruption test will validate the strategy for restoring a data center without affecting the primary production systems - Answers false BYOD stands for Bring Your Own Desktop - Answers false One component of a DRP might be to use preemptive techniques (such as disk mirroring, interruptible power supplies, fire prevention systems, and anti virus software) that prevent the DRP from ever needing to be executed. - Answers true Identification, Authentication, Authorization, and Accountability are 4 basic components of access controls. - Answers true Operating systems for smartphones often lack the same level of security as found in Windows, Linux, and Mac OS 10. - Answers true Managing user authorization at an individual user level is usually easier than managing user authorization at a group level. - Answers false A dictionary password attack will try significantly more possible password values than a brute-force password attack. - Answers false Attempting to reset an online password and getting a code on your smartphone that must be entered as part of the reset process is referred to as synchronous authorization. - Answers false Adjusting the accuracy of biometric authentication methods to produce more accurate results can results in unacceptably long response times. - Answers true Kerberos is an authentication standard that was developed to address weaknesses in the SESAME authentication method. - Answers false Mandatory Access Control (MAC) is determined by the sensitivity of the material as opposed to specific access permissions being assigned to individual users. - Answers true

Show more Read less
Institution
CIST 1601
Course
CIST 1601









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIST 1601
Course
CIST 1601

Document information

Uploaded on
December 13, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIST 1601 Final Exam Questions and Correct Solutions Latest Update 2024-2025 (Graded A+)

Cleartext is a name for text that appears to be transparent or invisible during a data transmission. -
Answers False

A threat is any action or actor that could damage an asset. - Answers True

One of the functions of a EULA is to protect the software vendor from liability. - Answers True

The standard CIA triangle consists of Confidentiality, Integrity, and Authorization. - Answers False

An example of cryptography is to encrypt data, thus producing ciphertext - Answers True

To make the process of information security more manageable, an typical IT infrastructure is often dived
into nine domains. - Answers False

Different communication protocols, firewalls, routers, and VPNs are components commonly managed
within the WAN domain. - Answers True

The user is often the weakest link in IT infrastructure security. - Answers True

Private, Confidential, Internal Use Only, and Public Domain are four common government data
classification standards. - Answers False

A common information security acronym is AUP, which stands for Authorized User Practices. - Answers
False

The IoT is a concept dealing with the growing interconnectivity of almost everything over the Internet
(which means almost everything may be vulnerable to security issues). - Answers True

RFID allows the embedding of small communication devices within goods to keep track of inventory. -
Answers true

Data Analytics, Cloud Computing, and acceptance of TCP/IP as a global standard have had minimal effect
on the growth of IOT. - Answers false

SaaS (Software anytime anywhere Standards) is the leading standard for anywhere anytime software
service. - Answers false

When done properly, SEO will help drive customers to a company's website. - Answers true

Smart homes, health monitoring, smart automobiles, and GPS are all prime examples of IoT technology.
- Answers true

BYOD strategy is often less expensive for a company AND it reduces a company's security risk. - Answers
false

, Mobile IP allows a smartphone to function as a stationary Internet device even though the phone is
moving from one mobile cell to another. - Answers true

Metadata is the collected primary data (things like name, address, and phone #) from millions of
customer records. - Answers false

Developing interoperabiity and Standard of IoT devices will mean that almost everything will be able to
to talk to almost everything else, and thus may be less expensive for the manufacturer to support. But if
a manufacturer waits too long to bring a product to market, the manufacturer runs the risk of losing
market share to a competitor. - Answers true

Drug formulas, engineering plans, and patents are all examples of intellectual property. - Answers true

A white-hat hacker probably has the permission of a company to do penetration testing. - Answers true

OS fingerprint scanners, vulnerability scanners, and keystroke loggers are all examples of common
attack tools. - Answers true

A port scanner is a specialized type of monitoring tool used to examine packages at shipping yards on
the east, west, and southern coasts of the United States. - Answers false

A dictionary attack consists of attempting to break into a user's account by trying all possible
combinations of letters, numerals, and special characters to guess the user's password. - Answers false

DoS stands for Distributed online Services. - Answers false

Passive wiretapping will look at data transmission without altering the data, while active wiretapping
will try to change the data. - Answers true

A rootkit gets its name from the attacker having to obtain root or system privileges to install the rootkit.
- Answers true

ARP poisoning relies primarily on changing the IP address of the person sending an IP packet - Answers
false

Breaking into computer system A, and then using system A to launch an attack on against computer
system B (which trusts system A) is called a transitive attack - Answers true

Vulnerability = Risk X Threat - Answers false

A Risk Register is a detailed description of all the identified risks. - Answers true

The following represents a logical order of research and document production.



BCP leads to DRP which leads to BIA - Answers false

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
368
Member since
1 year
Number of followers
16
Documents
29812
Last sold
3 days ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

59 reviews

5
21
4
15
3
12
2
0
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions