100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITM 450|266 Exam 1 Review |Master Basics Questions And Answers $8.49   Add to cart

Exam (elaborations)

ITM 450|266 Exam 1 Review |Master Basics Questions And Answers

 6 views  0 purchase
  • Course
  • ITM 450
  • Institution
  • ITM 450

____________ refers to keeping information confidential that is personally identifiable or which might cause harm, embarrassment, or disgrace to someone if revealed. - ️️Privacy A main objective of awareness training is: - ️️Provide understanding of responsibilities A portion of the _____...

[Show more]

Preview 3 out of 20  pages

  • September 12, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITM 450
  • ITM 450
avatar-seller
jackline98
____________ refers to keeping information confidential that is personally identifiable or which might
cause harm, embarrassment, or disgrace to someone if revealed. - ✔ ✔ Privacy

A main objective of awareness training is: - ✔ ✔ Provide understanding of responsibilities

A portion of the ______________ is the logical and practical investigation of business pro- cesses and
organizational policies. This process/policy review ensures that the stated and implemented business
tasks, systems, and methodologies are practical, efficient, cost-effec- tive, but most of all (at least in
relation to security governance) that they support security through the reduction of vulnerabilities and
the avoidance, reduction, or mitigation of risk. - ✔ ✔ Risk aversion process

A risk management project may be subject to overlooking certain types of threats. What can assist the
risk management team to prevent that? - ✔ ✔ Automated tools

A security program cannot address which of he following business goals? - ✔ ✔ Accuracy of
Information

A Type B fire extinguisher may use all except which of the following suppression mediums? - ✔ ✔
Water

Acme Widgets currently uses a 1,024-bit RSA encryption standard companywide. The company plans to
convert from RSA to an elliptic curve cryptosystem. If it wants to maintain the same cryptographic
strength, what ECC key length should it use? - ✔ ✔ 160 bits

Alice would like to send a message to Bob using an asymmetric cryptography algorithm. What key
should she use to encrypt the message? - ✔ ✔ Bob's public key

All but which of the following items requires awareness for all individuals affected? - ✔ ✔ The
backup mechanism used to retain email messages

An information security policy does NOT usually include: - ✔ ✔ Guidelines for how to implement
policy

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20

,years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Mark the tapes before sending them to the warehouse.

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20
years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Record retention

An organization has a datacenter manned 24 hours a day that processes highly sensi- tive information.
The datacenter includes email servers, and administrators purge email older than six months to comply
with the organization's security policy. Access to the datacenter is controlled, and all systems that
process sensitive information are marked. Administrators routinely back up data processed in the
datacenter. They keep a copy of the backups on site and send an unmarked copy to one of the company
ware- houses. Warehouse workers organize the media by date, and they have backups from the last 20
years. Employees work at the warehouse during the day and lock it when they leave at night and over
the weekends. Recently a theft at the warehouse resulted in the loss of all of the offsite backup tapes.
Later, copies of their data, including sensitive emails from years ago, began appearing on Internet sites,
exposing the org - ✔ ✔ Use a secure offsite storage facility.

An organization is implementing a preselected baseline of security controls, but finds not all of the
controls apply. What should they do? - ✔ ✔ Tailor the baseline to their needs

At what voltage level can static electricity cause destruction of data stored on hard drives? - ✔ ✔
1,500

Bob receives a message from Alice that she sent using an asymmetric cryptography algorithm. What key
should he use to decrypt the message? - ✔ ✔ Bob's private key

Data classification can assist an organization in: - ✔ ✔ Reducing costs for protecting data

Data classifications are used to focus security controls over all but which of the following? - ✔ ✔
Layering

Dave is developing a key escrow system that requires multiple people to retrieve a key but does not
depend on every participant being present. What type of technique is he using? - ✔ ✔ M of N
control

, Ensure important datasets are developed, maintained, and accessible within their defined specifications.
- ✔ ✔ Data custodians

Entails analyzing the data that the organization retains, determining its importance and value, and then
assigning it to a category. - ✔ ✔ Data classification

For what type of information system security accreditation are the applications and systems at a
specific, self-contained location evaluated? - ✔ ✔ Site accreditation

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What goal of cryptography is Gina seeking to achieve by applying the digital signature? - ✔ ✔ Non-
repudiation

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Eric use to validate the digital signature? - ✔ ✔ Gina's public key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Gina use to create the digital signature? - ✔ ✔ Gina's private key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.



What key should Gina use to encrypt the message payload? - ✔ ✔ Eric's public key

Gina is sending an encrypted message to her colleague, Eric. She would like to ensure that the message
is confidential and also that Eric can prove that the message came from her. Therefore, she would like to
both encrypt the message content and apply a digital signature to the message.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jackline98. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.49
  • (0)
  Add to cart