100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
MISY 5325 FINAL EXAM PREDICTION EXAM WITH COMPLETE QUESTIONS AND VERIFIED ANSWERS $21.99   Add to cart

Exam (elaborations)

MISY 5325 FINAL EXAM PREDICTION EXAM WITH COMPLETE QUESTIONS AND VERIFIED ANSWERS

 4 views  0 purchase
  • Course
  • MISY 5325
  • Institution
  • MISY 5325

MISY 5325 FINAL EXAM PREDICTION EXAM WITH COMPLETE QUESTIONS AND VERIFIED ANSWERS

Preview 3 out of 20  pages

  • September 25, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • MISY 5325
  • MISY 5325
avatar-seller
wachiraMaureen
MISY 5325 FINAL EXAM PREDICTION EXAM
2024- 2025 WITH COMPLETE QUESTIONS
AND VERIFIED ANSWERS
Public key infrastructure (PKI) Correct Answer Bill is a security
professional. He is in a meeting with co-workers and describes a
system that will make web sessions more secure. He says when
a user connects to the web server and starts a secure session,
the server sends a certificate to the user. The certificate includes
a public key. The user can encrypt data with the public key and
send it to the server. Because the server holds the private key, it
can decrypt the data. Because no other entity has the private key,
no one else can decrypt the data. What is Bill describing?

Insurance Correct Answer Bonding is a type of __________ that
covers against losses by theft, fraud, or dishonesty.

Vulnerability × Threat . Correct Answer Complete the equation
for the relationship between risk, vulnerabilities, and threats: Risk
equals:

Software Development Correct Answer Functionality testing is
primarily used with:

Before writing an application or deploying a system Correct
Answer Ideally, when should you perform threat modeling?

read sections of a database or a whole database without
authorization. Correct Answer In a SQL injection attack, an
attacker can:

Tailgating Correct Answer Piggybacking is also known as:

,Weather Conditions; Natural Disasters Correct Answer Primary
considerations for assessing threats based on historical data in
your local area are __________ and ___________.

share, transfer Correct Answer Purchasing insurance is the
primary way for an organization to __________ or ___________
risk.

Preventative, detective, corrective Correct Answer Some controls
are identified based on the function they perform. What are the
broad classes of controls based on function?

technical Correct Answer System logs and audit trails are a type
of ________ control.

technical, procedural Correct Answer The actual methods used
to protect against data loss are __________ controls, but the
program that identifies which data to protect is a ___________
control.

Contingency Planning(CP) Correct Answer The National Institute
of Standards and Technology (NIST) publishes SP 800-53. This
document describes a variety of IT security controls, such as
access control, incident response, and configuration
management. Controls are grouped into families. Which NIST
control family helps an organization recover from failures and
disasters?

Mitigate Correct Answer To _________ risk means to reduce or
neutralize threats or vulnerabilities to an acceptable level.

encryption Correct Answer What changes plaintext data to
ciphered data?

, They are both performed for a specific time. Correct Answer
What characteristic is common to risk assessments and threat
assessments?

They both specify that users be granted access only to what they
need to perform their jobs. Correct Answer What does the
principle of least privilege have in common with the principle of
need to know?

A group of statements that either succeed or fail as a whole
Correct Answer What is a transaction in a database?

To prevent people from denying they took actions Correct Answer
What is the purpose of nonrepudiation techniques

Where a system is manufactured Correct Answer When
performing threat assessments, it's important to ensure you
understand the system or application you are evaluating. To
understand a given system or application, you need to understand
all of the following, except:

A Locked Door Correct Answer Which of the following is a
physical control that is most likely to be used with a proximity
card?

A backup plan Correct Answer Which of the following is most
likely to describe how to perform test restores?

Functional Correct Answer Which of the following is not a
common category of control implementation?

AES is the primary asymmetric encryption protocol used today
Correct Answer Which of the following is not a true statement
about AES?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller wachiraMaureen. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $21.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$21.99
  • (0)
  Add to cart