100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIS 110 TEST 1 QUESTIONS WITH CORRECT ANSWERS

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
19-12-2025
Written in
2025/2026

CIS 110 TEST 1 QUESTIONS WITH CORRECT ANSWERS

Institution
CIS 110
Course
CIS 110









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIS 110
Course
CIS 110

Document information

Uploaded on
December 19, 2025
Number of pages
11
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CIS 110 TEST 1 QUESTIONS WITH
CORRECT ANSWERS

Which of the following is a legitimate responsibility of an organization regarding user
private data? - Answer- Limit administrative access to personal information.

Which of the following is a place where steganography can hide data? - Answer- in the
metadata of a file

Which of the following is a risk associated with the use of private data? - Answer-
Associations with groups.

Which of the following is an advantage of hardware encryption over software
encryption? - Answer- Hardware encryption is not subject to attacks like software
encryption.

Which of the following is NOT a privacy best practice? - Answer- Always carry your
Social Security number with you

Which of the following is NOT a protection for information that cryptography can
provide? - Answer- redundancy

Which of the following is NOT an element of asymmetric cryptography? - Answer- Hash
Algorithm

Which of the following is NOT true about privacy? - Answer- Privacy of any level that
you desire is easily achievable today.

Which of the following is NOT true regarding how individuals are concerned how their
private data is being used? - Answer- Their personal information is no more at risk
today than it was 10 years ago.

Which of these is a characteristic of a secure hash algorithm? - Answer- Two different
sets of data cannot produce the same digest

Which technology hides the existence of data? - Answer- Steganography

Which type of cryptography creates a value that is primarily used for comparison
purposes? - Answer- hashing

, Cryptography hides the existence of data while steganography scrambles a message so
that it cannot be understood. - Answer- False

If the URL of a web site begins with https, the server is using a digital certificate to verify
the existence and identity of the organization. - Answer- True

Online data is collected for a number of activities, but not for online purchases. -
Answer- False


From January 2005 through July 2015, approximately how many electronic data records
in the United States were breached, exposing to attackers a range of personal
electronic data, such as address, Social Security numbers, health records, and credit
card numbers? - Answer- 853 million

How do attackers today make it difficult to distinguish an attack from legitimate traffic? -
Answer- using common Internet protocols

Information contained on devices is protected by three layers: Two of the layers are
products and policies and procedures. What is the third layer? - Answer- people

Security is ____ convenience. - Answer- inversely proportional to

Terrorists who turn their attacks to the network and computer infrastructure to cause
panic among citizens are known as which of the following? - Answer- cyberterrorists

Under which law must healthcare enterprises guard protected health information and
implement policies and procedures to safeguard it, whether it be in paper or electronic
format? - Answer- HIPAA

What does the FBI define as any "premeditated, politically motivated attack against
information, computer systems, computer programs, and data which results in violence
against non-combatant targets by sub-national groups or clandestine agents?" -
Answer- cyberterrorism

What is a flaw or weakness that allows a threat agent to bypass security? - Answer-
vulnerability

What term is frequently used to describe the tasks of securing information that is in a
digital format? - Answer- information security

Where are you most likely to find a PKES system? - Answer- An automobile

Which attacker category might have the objective of retaliation against an employer? -
Answer- insider

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
779
Member since
3 year
Number of followers
475
Documents
15093
Last sold
3 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

163 reviews

5
87
4
21
3
25
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions