100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 267 Book 1,2,3,4,5 Flashcards _ 100- vSURE ANSWERS.pdf $7.99   Add to cart

Exam (elaborations)

ITN 267 Book 1,2,3,4,5 Flashcards _ 100- vSURE ANSWERS.pdf

 1 view  0 purchase
  • Course
  • CGFM - Certified Government Financial Manager
  • Institution
  • CGFM - Certified Government Financial Manager

ITN 267 Book 1,2,3,4,5 Flashcards _ 100- vSURE ANSWERS.pdf

Preview 3 out of 19  pages

  • August 4, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CGFM - Certified Government Financial Manager
  • CGFM - Certified Government Financial Manager
avatar-seller
Denyss
8/4/24, 12:31 PM



ITN 267 Book 1,2,3,4,5
Jeremiah
Terms in this set (125)

A ________ is a method of controlled entry mantrap
into a facility and provides access to secure
areas such as a research lab or data center.


key-card
mantrap
video surveillance system
technical safeguard

A single point of failure is a piece of the functioning of the entire system
hardware or application that is key to
________________________.


specifying how long systems may be offline
before an organization starts to lose money
the success of safeguards
ensuring that individuals with proper
permission can use systems and retrieve
data in a dependable manner
the functioning of the entire system

All of the following are ways to protect shoulder surfing
confidentiality except:


encryption
access controls
passwords
shoulder surfing

In which of the following types of phone calls
communication is phishing least likely to
occur?


phone calls
email


ITN 267 Book 1,2,3,4,5




instant messages
chat rooms


1/19

,8/4/24, 12:31 PM
_ ________ is the process of reviewing known Risk analysis
vulnerabilities and threats.


Risk avoidance
Risk mitigation
Risk analysis
Risk engineering

_ __________ refers to applying safeguards Risk mitigation
designed to lower risks to a level deemed
acceptable but without eliminating such
risks.


Residual risk
Risk avoidance
Risk mitigation
Risk transfer

_ ______________ involves tricking other Social engineering
people into breaking security procedures
and sharing sensitive information.


Shoulder surfing
E-mail spam
Social engineering
Integrity

What is the window of vulnerability? the time between exploit discovery and an installed security patch


the period of time when antivirus software
must be updated
the period of time when an attacker may
launch a DoS attack
the time between a malware attack and
discovery by security personnel
the time between exploit discovery and an
installed security patch




ITN 267 Book 1,2,3,4,5
https://quizlet.com/ca/835106064/itn-267-book-12345-flash-cards/ 2/19

, 8/4/24, 12:31 PM
What situation would be an example of an An art thief sneaks into a museum and steals a famous painting and then sneaks out of
exploit? the museum without being caught by security because the thief identified and traveled
through the museum via blind spots of the museum's security cameras. After the
A major league baseball pitcher takes his incident, the museum increases the number of security guards and cameras guarding
daughter to a carnival and plays a game the museum at all times.
wherein he can earn prizes if he can use a
beanbag to knock over all of the cans
stacked in a pyramid formation in the game's
booth. In each of the 10 rounds of the
carnival game that the pitcher plays, he
knocks down all the cans, and he wins his
daughter the largest stuffed animal prize in
the booth.


An art thief sneaks into a museum and steals
a famous painting and then sneaks out of the
museum without being caught by security
because the thief identified and traveled
through the museum via blind spots of the
museum's security cameras. After the
incident, the museum increases the number
of security guards and cameras guarding the
museum at all times.


A film reel catches fire in the middle of a
crowded showing of a popular new release
film. The film is ruined. Due to the cinema's
policy, all of the people in that audience
receive refunds for the price of their tickets.


A man discovers someone's lost wallet.
When the man attempts to use the credit
cards found in the wallet, he finds that they
have been reported as stolen and he is
unable use the cards to carry out any
transactions.

Which of the following statements More people are interested in information security, and have developed the skills to
summarizes why the window of vulnerability find new vulnerabilities.
is shrinking?


People are getting better at enduring and
recovering from exploits.


There are also fewer people with the skills
needed to create vulnerabilities.


More people are interested in information
security, and have developed the skills to
find new vulnerabilities.


People are not inclined to attack
vulnerability for financial gain.




ITN 267 Book 1,2,3,4,5
https://quizlet.com/ca/835106064/itn-267-book-12345-flash-cards/ 3/19

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Denyss. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75057 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart