Preview

Study Guide

Satisfactory Essays
Open Document
Open Document
790 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Study Guide
Nt258 Final

NT2580 Final Exam Study Guide

1. Threat is an action that could damage an asset. Page 6

2. Which law requires all types of financial institutions to protect customers’ private financial information? GLBA or the Gramm-Leach-Bliley-Act

3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality? Protecting Private Data- The Process of ensuring data confidentiality

4. Standard is a detailed written definition of how software and hardware are to be used? Page 40

5. Private Data, Confidential, Internal use only, Public Domain is not a common type of data classification standard.

6. What does a lapse in a security control or policy create? Closing Security Gaps - A laps in a security control in a policy creates a gap.

7. Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.

8. Risk - Refers to the likely hood of exposure to danger.

9. Which type of attacker intends to be helpful? White-hat hackers - Ethical hacking...Intending to be helpful.

10. Which domain is primarily affected by weak endpoint security on a VPN client? Remote Access Domain - Primarily affected by endpoint security on VPN clients.

11. Identify two phases of the access control process.

12. You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following? Page 144

13. __________ is a type of authentication? Page 147

14. Identify an example of an access control formal model. Page 161

15. __________ access control models is based on a mathematical theory published in 1989 to ensure fair competition? Page 170

16. __________ are primary categories of rules that most organizations must comply with? Page 184

17. __________ is not a part of an ordinary IT security policy framework? Page 192

18. __________ helps you determine the appropriate access to

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    12. You log onto a network and are asked to present a combination of elements, such as user name, password, token, smart card, or biometrics. This is an example of which of the following?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Study Guide

    • 1251 Words
    • 6 Pages

    1. How many moles of H+(aq) ions are present in 1.25 L of 0.75 M nitric acid?…

    • 1251 Words
    • 6 Pages
    Good Essays
  • Good Essays

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    6. Which of the following should be considered while implementing a layered access security approach?…

    • 939 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fin/370 Week 1 Assignment

    • 636 Words
    • 3 Pages

    Risk is a probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities, and that may be avoided through preemptive action. The role of risk in finance is the probable ability of an investment to fail.…

    • 636 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAB 3

    • 531 Words
    • 3 Pages

    Within the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, remediate, and monitor?…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Study Guide

    • 5149 Words
    • 21 Pages

    1. Choose a small section of the narrative of the plaques in Exodus 7-12, and identify the parts of the passage that you would attribute to J, E, and P. What characteristic phrases and themes of each source occur in the passage?…

    • 5149 Words
    • 21 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Study Guide

    • 486 Words
    • 2 Pages

    Berkin, et. al., Making America. This is a list of terms that are the basis of the multiplechoice questions on the examination. Some of the terms are very general, while some are…

    • 486 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 1022 Words
    • 3 Pages

    Answer at least 2 of these questions comprehensively and complete a reply response to at least two students.…

    • 1022 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Study Guide

    • 470 Words
    • 2 Pages

    11. Jewish Americans are distinguished from the majority of Americans on the basis of their…

    • 470 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    These policies will eliminate confusion and specify the types of security that will ensure the safe and secure operation of the business. Furthermore, the policies have measureable goals and methods of testing the policies to determine their effectiveness in providing confidential information while retaining the integrity of the data and making the data readily available.…

    • 3396 Words
    • 14 Pages
    Best Essays