100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

SNHU CYB 200 CHAPTER 1 FINAL EXAMINATION AND ANSWERS GRADED A+ () UPDATE.

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
06-08-2025
Written in
2025/2026

IoT - Answer (Internet of Things) refers to a network of physical objects of things that are embedded with electronics, sensors, software, and network creativity. These physical objects can exchange data with each other identity theft - Answer CYBERSPACE - Answer Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer suite of protocols developed for communicating across a network Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer breakes messages into chunks/packets - data readable in each IP packet Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer readable mode is "cleartext" data must be encrypted unified communications - Answer the integration of communication channels into a single service unified communications - Answer real-time Session Initiaion Protocol-enabled applications (SIP-enabled applications) (ex. Skype) risk - Answer level of exposure to some event that has an effect on an asset(computer, database, piece of info) threat - Answer any action, natural or human induced, that can damage an asset vulnerability - Answer weakness that allows a threat to be realized or have an effect on an asset End-User License Agreement (EULA) - Answer TAKES EFFECT WHEN SOFTWARE INSTALLED - BURDEN OF PROTECTING IT SYSTEM ON IT SECURITY PROS

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 6, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

SNHU CYB 200 CHAPTER 1 FINAL
EXAMINATION AND ANSWERS
GRADED A+ (2025-2026) UPDATE.
IoT - Answer (Internet of Things) refers to a network of physical objects of things that are
embedded with electronics, sensors, software, and network creativity. These physical objects
can exchange data with each other



identity theft - Answer



CYBERSPACE - Answer



Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer suite of protocols
developed for communicating across a network



Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer breakes messages into
chunks/packets - data readable in each IP packet



Transmission Control Protocol/Internet Protocol (TCP/IP) - Answer readable mode is
"cleartext" data must be encrypted



unified communications - Answer the integration of communication channels into a single
service



unified communications - Answer real-time Session Initiaion Protocol-enabled applications
(SIP-enabled applications) (ex. Skype)



risk - Answer level of exposure to some event that has an effect on an asset(computer,
database, piece of info)



threat - Answer any action, natural or human induced, that can damage an asset



vulnerability - Answer weakness that allows a threat to be realized or have an effect on an

, End-User License Agreement (EULA) - Answer BETWEEN USER AND SOFTWARE VENDOR



SECURITY - Answer being free from danger or threat



INFORMATION SYSTEMS SECURITY - Answer COLLECTION OF ACTIVITES THAT PROTECT THE
INFO SYSTEM AND STORED DATA



FISMA (Federal Information Security Management Act) 2002 - Answer FED CIVILIAN AGENCIES
TO PROVIDDE SEC CONTROLS OVER FED OPERATIONS



FISMA FEDERAL INFO SEC MODERNIZATION ACT 2014 - Answer UPDATE MODERN THREATS



SOX Act of 2002 - Answer Requires managers and auditors of public companies to document
and certify the system of internal control



GLBA (1999) - Answer "Graham-Leach-Bliley Act" (Financial Services Modernization Act of
1999) repealed a 1933 law that barred the consolidation of financial institutions and insurance
companies. Included within GLBA are multiple sections relating to the privacy of financial
information. Companies must provide written notice to consumers of their privacy rights and
explain the company's procedures for safeguarding data.



HIPPA - Answer Health Insurance Portability and Accountability Act -IMPLEMENT SEC PRIV
CONTROLS



CIPA 2000/2011 - Answer Children's Internet Protection Act - PUBL SCHOOLS/LIBR TO USE
INTERNET SAFETY POLICY



FERPA (1974) - Answer Family Educational Rights and Privacy Act, limits disclosure of student
records; Involves Privacy Rule of 2001 - established national rights for privacy and security
concerning health records



EU GDPR - Answer PROT CITIZENS INDIVIDUAL DATA

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestSolver9 Webster University
View profile
Follow You need to be logged in order to follow users or courses
Sold
724
Member since
2 year
Number of followers
124
Documents
24081
Last sold
17 hours ago
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3.6

126 reviews

5
56
4
19
3
21
2
9
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions