100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 267 Midterm 1-7 and Final 1-10 || very Flawless.

Beoordeling
-
Verkocht
-
Pagina's
14
Cijfer
A+
Geüpload op
19-12-2024
Geschreven in
2024/2025

1. The main goal of information security is to protect: A. non-public personally identifiable information B. confidentiality, integrity, and availability C. personal health data and biometrics D. financial data of public entities correct answers Answer: B Reference: p 4 2. All of the following are true with respect to cryptography except: A. hides information so unauthorized persons can't access it B. preserves confidentiality C. only used today by health care providers to protect health care data D. were used by the military to protect confidential communications correct answers Answer: C Reference: p 5 3. _______________ is the process of reviewing known vulnerabilities and threats. A. Risk avoidance B. Risk mitigation C. Risk analysis D. Risk engineering correct answers Answer: C Reference: p 16 4. What is the process of applying safeguards to avoid a negative impact? A. risk mitigation B. risk transfer C. risk analysis D. risk avoidance correct answers Answer: D Reference: p 16 5. ___________________ refers to applying safeguards designed to lower risks to a level deemed acceptable but without eliminating such risks. A. Residual risk B. Risk avoidance C. Risk mitigation D. Risk transfer correct answers Answer: C Reference: p 16 6.______________ means that only people with the right permission can access and use information. A. Authorized agent B. Confidentiality C. Integrity D. Encryption correct answers Answer: B Reference: p 5

Meer zien Lees minder
Instelling
ITN 267
Vak
ITN 267









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ITN 267
Vak
ITN 267

Documentinformatie

Geüpload op
19 december 2024
Aantal pagina's
14
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ITN 267 Midterm 1-7 and Final 1-10 || very Flawless.
1. The main goal of information security is to protect:

A. non-public personally identifiable information
B. confidentiality, integrity, and availability
C. personal health data and biometrics
D. financial data of public entities correct answers Answer: B Reference: p 4

2. All of the following are true with respect to cryptography except:

A. hides information so unauthorized persons can't access it
B. preserves confidentiality
C. only used today by health care providers to protect health care data
D. were used by the military to protect confidential communications correct answers Answer: C
Reference: p 5

3. _______________ is the process of reviewing known vulnerabilities and threats.

A. Risk avoidance
B. Risk mitigation
C. Risk analysis
D. Risk engineering correct answers Answer: C Reference: p 16

4. What is the process of applying safeguards to avoid a negative impact?

A. risk mitigation
B. risk transfer
C. risk analysis
D. risk avoidance correct answers Answer: D Reference: p 16

5. ___________________ refers to applying safeguards designed to lower risks to a level
deemed acceptable but without eliminating such risks.

A. Residual risk
B. Risk avoidance
C. Risk mitigation
D. Risk transfer correct answers Answer: C Reference: p 16

6.______________ means that only people with the right permission can access and use
information.

A. Authorized agent
B. Confidentiality
C. Integrity
D. Encryption correct answers Answer: B Reference: p 5

, 7. All of the following are ways to protect confidentiality except:

A. encryption
B. access controls
C. passwords
D. shoulder surfing correct answers Answer: D Reference: p 6

8. _________________________ involves tricking other people into breaking security
procedures and sharing sensitive information.

A. Shoulder surfing
B. E-mail spam
C. Social engineering
D. Integrity correct answers Answer: C Reference: p 6

1._____________ is an individual's right to control the use and disclosure of his or her own
personal data.

A. Preference
B. Privacy
C. Integrity
D. Access correct answers Answer: B Reference: p 36

2. What is the source of legal authority for the U.S. government?

A. The First Amendment
B. Laws enacted by state Supreme Courts
C. The Fourth Amendment
D. The U.S. Constitution correct answers Answer: D Reference: p 38

3. Which of the following U.S. Constitution amendments contribute to the right of privacy?

A. First, Second, and Third Amendments
B. First and Sixth Amendments
C. First, Third, and Fourth Amendments
D. First, Second, and Fourth Amendments correct answers Answer: C Reference: p 38

4. __________________ is a body of law developed because of legal tradition and court cases.

A. Common law
B. Privacy law
C. Public law
D. Administrative law correct answers Answer: A Reference: p 44

5. A ______________ is some kind of wrongful act that harms or hurts a person.
€10,51
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
FullyFocus NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
734
Lid sinds
3 jaar
Aantal volgers
437
Documenten
34514
Laatst verkocht
1 dag geleden
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lees meer Lees minder
3,7

110 beoordelingen

5
46
4
20
3
22
2
8
1
14

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen