100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ITSY 1300 TEST 2 QUESTIONS & ANSWERS

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
17-09-2025
Escrito en
2025/2026

ITSY 1300 TEST 2 QUESTIONS & ANSWERS

Institución
ITSY 1300
Grado
ITSY 1300









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ITSY 1300
Grado
ITSY 1300

Información del documento

Subido en
17 de septiembre de 2025
Número de páginas
14
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ITSY 1300 TEST 2 QUESTIONS & ANSWERS

The data security manage function is geared around ____ creation and enforcement -
Answer -Policy

____ policies provide directional guidance in broad terms - Answer -General

____ policies guide data security work - Answer -Computer Security

A(n) ____ guides individual access and employment of data - Answer -Acceptable use
policy

____ authentication is highly secure because physical characteristics such as
fingerprints are unique to the individual and hard to duplicate - Answer -Biometric

The ____ principle ensures that inappropriate accesses are identified and reported -
Answer -Accountability

____ are general statements about intent - Answer -Policies

"Account management" describes the actual management process that assigns the
monitors ____. - Answer -User privileges

Criterion-based access control is typically implemented by means of a pre-programmed
____. - Answer -Access control list

In a ____ system, the subject's access permissions are assigned based on the security
attributes that they possess and the rules that have been established for these
attributes. - Answer -Mandatory access control

In the world of business, the most common model for access control is ____. - Answer
-DAC

____ audit processes use event logs, critical system files, and other evidence-based
means to identify exploits that an automated system cannot recognize. - Answer -
Human-based

____ incidents include such things as pre-attack probes, unauthorized access attempts,
or structural vulnerabilities. - Answer -Potential

In simple terms, cryptography involves a(n) ____ algorithm. - Answer -Encryption

In ____ cryptography, the same key is used for both encryption and decryption. -
Answer -Secret Key

, In ____ cryptography, the encryption and decryption operations are the same, but they
use different keys. - Answer -Public Key

The term ____ describes the collection of technologies, protocols, and policies that
maintain, distribute, create, and validate public keys and their associated information. -
Answer -PKI

The ____ should specify how the asset base lining, access control, status accounting,
and data integrity functions will be carried out. - Answer -Evaluation plan

The ___ function ensures that the data and its associated controls are fully maintained
in the day-one state. - Answer -Status accounting

The day-one status of the data asset base is established through the ____. - Answer -
Baseline status evaluation

The ____ plan has to ensure that the findings contained in the report document any
expert conclusions drawn from the evidence. - Answer -Communications

Because of the legal concept of "____", it is possible that one questionable item of
evidence can also eliminate other forms of evidence that be derived from that item. -
Answer -Fruit of the poisoned tree

The simplest requirement for forensic evidence is that it is ____ in court. - Answer -
Believable

The ____ policy dictates how and in what time-frame spam is removed. - Answer -Data
retention

____ can include all internal storage sources such as static memory as well as disks
and other forms of storage. - Answer -Physical media

____ consists of the protocols for the analysis of data. - Answer -Forensic analysis

The principle feature of a final report is always the recommendation about the ____ of
the incident. - Answer -Root cause

The final element of the forensic process is the ____. - Answer -Dissemination of the
findings

The one single aspect of the conventional data processing operation that is certain to
require definition from a forensic perspective is the ____ policy. - Answer -Data
retention

Ensuring legally correct evidence in digital forensics is a tricky proposition, because it
relies on the proper use of ____. - Answer -Tools
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2000
Miembro desde
3 año
Número de seguidores
1444
Documentos
46990
Última venta
2 días hace

3.8

342 reseñas

5
170
4
61
3
44
2
16
1
51

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes