8/1/24, 2:40 PM 1/7 and how the provider protects that information. Zacks ISM 6574 Final Jeremiah Terms in this set (81) SP 800-161 organizes security controls for SCRM into which of the following categories? All of the above 3 multiple choice options Which of the following is NOT a category that SP 800-161 organizes security controls for SCRM into? Rapid Elasticity 3 multiple choice options Which of the following is NOT a security control of the provenance family? Security management for provenance 3 multiple choice options The security controls of the provenance family that provides guidance for implementing a provenance policy. Provenance policy and procedures 3 multiple choice options Which of the following is NOT a service model of cloud computing, according to NIST? Private cloud as a service 3 multiple choice options In this model, the consumer can use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser. Software as a service 3 multiple choice options Some of the threats to cloud service users are: All of the above 3 multiple choice options This arises from the fact that cloud service users consume delivered resources through service models, thereby making the customer -built IT system dependent on those services. Responsibility ambiguity 3 multiple choice options These policies describe the different types of information collected; how that information is used, disclosed, and shared; Privacy policies 3 multiple choice options Zacks ISM 6574 Final 8/1/24, 2:40 PM Zacks ISM 6574 Final https://quizlet.com/926482121/zacks -ism-6574 -final-flash -cards/ 2/7 This section prohibits activities that providers consider to be improper or outright illegal uses of their service. Conversely, the provider usually agrees not to violate the intellectual property rights of the customer. Acceptable use policy 3 multiple choice options One of the key characteristics of a security architecture include the models and principles show where to take which type of measures, when the principles are applicable, and how the principles connect with other principles True 1 multiple choice option Which of the following is NOT a key characteristic of a security architecture It must be capable of identifying common types of malware as well as attacker tools 3 multiple choice options Which of the following is NOT a good malware software capability of SP 800-83 All of the above are capabilities 3 multiple choice options SP 800-83 indicates that good malware software has the following capabilities: It must scan each file for known malware. Anti-malware software on hosts should be configured to scan all hard drives regularly to identify any file system infections and, optionally, depending on organization security needs, to scan removable media inserted into the host before allowing its use 3 multiple choice options Which of the following is one of the best practices for avoiding common security mistakes with IAM? All of the above 3 multiple choice options Which of the following is NOT one of the best practices for avoiding common security mistakes with IAM? Deploy multifactor authentication judiciously 3 multiple choice options Regular expressions, keywords, and other basic pattern -matching techniques are best suited for basic structured data, such as credit card numbers and Social Security numbers. This technique efficiently identifies data blocks, files, database records, and so on that contain easily recognized sensitive data. This is known as: Rule-based 3 multiple choice options This technique looks for a partial match on a protected document. It involves the use of multiple hashes on portions of the document, such that if a portion of the document is extracted and filed elsewhere or pasted into an email, it can be detected. This technique is known as: Partial document matching 3 multiple choice options This refers to the original message or data block that is fed into the algorithm as input. Plaintext 3 multiple choice options Symmetric encryption has which of the following ingredients? All of the above 3 multiple choice options
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $6.99. You're not tied to anything after your purchase.