1602 Final Exam Questions & Correct Solutions
A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use is known as a(n)
A potential weakness in an asset or its defensive control system(s) is known as a(n)
A technique used to...
1). A hacker who intentionally removes or bypasses software copyright protection designed to
prevent unauthorized duplication or use is known as a(n)
Ans: Cracker
2). A potential weakness in an asset or its defensive control system(s) is known as a(n)
Ans: Vulnerability
3). A technique used to compromise a system is known as a(n)
Ans: Exploit
4). T/f deterrence is the best method for preventing an illegal or unethical activity.
Ans: TRUE
5). A process focused on the identification and location of potential evidence related to a
specific legal action after it was collected through digital forensics is known as
Ans: E-Discovery
6). Another key u.s. federal agency is _________, which is responsible for coordinating, directing,
and performing highly specialized activities to protect u.s. information systems and
produce foreign intelligence information.
Ans: NSA
7). The individual responsible for the assessment, management, and implementation of
information-protection activities in the organization is known as a(n)
Ans: CISO
8). A qualified individual who is tasked with configuring security technologies and operating
other technical control systems is known as a(n)
PaperStoc.com Page 1 of 6
, Ans: Security Technician
9). A high-level executive such as a cio or vp-it, who will provide political support and influence
for a specific project, is known as a(n)
Ans: Champion
10). According to nist sp 800-18, rev. 1, which individual is responsible for the creation, revision,
distribution, and storage of the policy?
Ans: Policy Administrator
11). T/f non-mandatory recommendations that the employee may use as a reference in
complying with a policy are known as regulations
Ans: False
12). T/f information security policies are designed to provide structure in the workplace and
explain the will of the organization's management.
Ans: False
13). In large organizations, the infosec department is often located within a(n) _________ division
headed by the _________, who reports directly to the _________.
Ans: IT, CISO, CIO
14). Medium-sized organizations tend to spend approximately __________ percent of the total it
budget on security.
Ans: 11%
15). An (isc)2 program geared toward individuals who want to take any of its certification exams
before obtaining the requisite experience for certification is the __________.
Ans: Associate of (ISC)2
16). A specialized security administrator responsible for performing systems development life
cycle (sdlc) activities in the development of a security system is known as __________.
PaperStoc.com Page 2 of 6
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Academik001. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.