100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

UTK INMT 341 Final Exam | 2025/2026 Full Exam Kit | 130+ Verified Q&A with Correct Answers | A+ Study Choice

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
06-12-2025
Written in
2025/2026

This document contains the complete UTK INMT 341 Final Exam Kit for the 2025/2026 cycle. It features 130+ solved exam-style questions with correct and verified answers. Content covers critical areas of information management and technology including: Encryption methods (symmetric, asymmetric, PKI, AES) Information security objectives (confidentiality, integrity, availability, authentication, nonrepudiation) Risk management, ERM, and IT governance frameworks (COSO, COBIT, ITIL, ISACA) Application controls (range checks, limit checks, sequence checks, validity checks, reconciliation, closed-loop verification) Intrusion detection and prevention systems (IDS, IPS, firewalls, DMZ) Business continuity and disaster recovery planning (BCP, DRP, hot site, cold site, UPS) Identity and access management (IAM, multifactor authentication, ACLs, logical access controls) Backup strategies (full, incremental, differential, replication) Compliance and regulatory frameworks (SOX, GLBA, FISMA) Each question is paired with the correct answer and rationale, ensuring clarity and exam readiness. Perfect for UTK students preparing for INMT 341 finals or anyone seeking a comprehensive review of IT risk, security, and governance concepts.

Show more Read less
Institution
UTK INMT
Course
UTK INMT










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
UTK INMT
Course
UTK INMT

Document information

Uploaded on
December 6, 2025
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

UTK INMT 341 Final Exam
(2025-2026 Full Exam Kit) Solved Q&A | Correct &
130+
Verified Answers


VERIFIED ANSWERS


Question 1
Asymmetric (public key) encryption
Correct Answer
A cipher technique in which different cryptographic keys are used to encrypt and decrypt a message
Public key—everyone has access.
Private key—used to decrypt (only known by owner).
Public key can be used by all your trading partners.


Question 2
Input Controls
Correct Answer
every transaction to be processed is entered, processed and recorded accurately and completely (and timely when
applicable). These controls should ensure that only valid and authorized information is input and these transactions are
processed only once. Includes manual & machine inputs.


Question 3
Intrusion Detection Systems (IDSs)
Correct Answer
The IDS looks deep into the network and sees what is happening from the security point of view. An IDS sits off to the
side of the network, monitoring traffic at many different points, and provide visibility into the security posture of the
network.


Question 4
Vulnerability
Correct Answer
Weakness or flaw in an information asset/system (infrastructure, networks, or applications) that potentially exposes an
entity to threats. Vulnerabilities include security flaws in a system that allow an attack to be successful. A vulnerability
might include system security procedures, internal controls, or implementation that could be exploited or triggered by a
threat source.




Trusted by thousands of students and professionals worldwide Page 1 of 21

,Question 5
Cipher
Correct Answer
An algorithm to perform encryption


Question 6
Control Objectives
Correct Answer
Controls provide reasonable assurance that the business objectives of the organization will be achieved and that risk
events will be:
Prevented - Preventative controls
Detected ‐ Detective controls
Corrected ‐ Corrective controls


Question 7
Public key infrastructure (PKI)
Correct Answer
involves a series of processes and technologies for the association of cryptographic keys with the entity to whom those
keys were issued. PKI supports the distribution and identification of public encryption keys, enabling users and
computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.


Question 8
Encryption
Correct Answer
The process of taking an unencrypted message (plaintext), applying a mathematical function to it (encryption algorithm
with a key) and producing an encrypted message.


Question 9
Reasonableness check (Application Control)
Correct Answer
Input data are matched to predetermined reasonable limits or occurrence rates.


Question 10
Business continuity plan (BCP)
Correct Answer
plan used by an enterprise to respond to disruption of critical business processes. The goal is quick and complete
recovery and resumption of normal operations. Depends on the contingency plan for restoration of critical systems




Trusted by thousands of students and professionals worldwide Page 2 of 21

, Question 11
General Controls (Non-IT)
Correct Answer
Internal accounting controls, operational controls, administrative controls, organizational security policies, etc.

Each non‐IT general control can be translated into an IS‐specific control. A well‐designed information system should
have controls built in for all its sensitive or critical functions.


Question 12
Range Check (Application Control)
Correct Answer
Data should be within a predetermined range of values.


Question 13
How do you determine which specific controls are needed?
Correct Answer
Many things:
Nature of the risk
• Cost benefit of the control
• Vulnerabilities identified
• Risk appetite
• Risk strategy
• Risk tolerance
• Nature of the technology


Question 14
Continuous Monitoring
Correct Answer
A detective control that involves gathering selective evidence to monitor system reliability and employee compliance
with organization's information security policies on a continuous basis.


Question 15
Zero‐balance test
Correct Answer
requires the balance of an account to be zero after all entries to it have been made.


Question 16
Digital certificate
Correct Answer
A digital certificate is used to verify the trustworthiness of a website. It is a digital credential that provides information
about the identity of an entity as well as other supporting information such as the owner's public key, the expiration
date of the certificate, the owner's name and other information about the public key owner.




Trusted by thousands of students and professionals worldwide Page 3 of 21

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MedTechStudyHub Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
37
Member since
1 year
Number of followers
2
Documents
1234
Last sold
1 day ago
BrainBooster

Get access to 100% verified exams, test banks, and study guides for ATI, NURSING, PMHNP, TNCC, USMLE, ACLS, WGU, and many more! We guarantee authentic, high-quality content designed to help you ace your exams with confidence. If you can’t find what you’re looking for, simply contact us — we’ll fetch it for you within minutes! ✅ Trusted by thousands of students ✅ Fast delivery & verified accuracy ✅ Guaranteed success on your next exam Buy with confidence — success starts here!

Read more Read less
4.3

12 reviews

5
7
4
3
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions