100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
PURDUE CS 307 MIDTERM EXAM ACTUAL EXAM 200 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) |ALREADY GRADED A+ $27.99   Add to cart

Exam (elaborations)

PURDUE CS 307 MIDTERM EXAM ACTUAL EXAM 200 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) |ALREADY GRADED A+

 9 views  0 purchase
  • Course
  • PURDUE CS 307
  • Institution
  • PURDUE CS 307

PURDUE CS 307 MIDTERM EXAM ACTUAL EXAM 200 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) |ALREADY GRADED A+ PURDUE CS 307 MIDTERM EXAM ACTUAL EXAM 200 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) |ALREADY GRADED A+

Preview 3 out of 20  pages

  • August 17, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • PURDUE CS 307
  • PURDUE CS 307
avatar-seller
Settings
PURDUE CS 307 MIDTERM EXAM 2024-2025 ACTUAL
EXAM 200 QUESTIONS AND CORRECT DETAILED
ANSWERS WITH RATIONALES (VERIFIED ANSWERS)
|ALREADY GRADED A+
Which of the following policies requires that two individuals review and approve each other's work
before the task is considered complete?

a. Two-person control

b. Separation of duties

c. Task rotation

d. Job rotation - ANSWER-Two-person control



Ultimately, the _______________________ is the spokesperson for the security team and is responsible
for the overall InfoSec program - ANSWER-CISO



In the classification of information security positions, senior people with a lot of broad knowledge, but
often not a lot of depth, fall under the category of those that ____________________. - ANSWER-Define



According to Schwartz et al., employees who create and install security solutions fall under which
classification of InfoSec positions?

a. Administers

b. Architects

c. Definers

d. Builders - ANSWER-Builders



Which of the following is NOT a common type of background check that may be performed on a
potential employee?

a. Motor vehicle records

b. Identity check

c. Drug history

d. Political activism - ANSWER-Political activism

,InfoSec is a profession with little personnel turnover - most InfoSec professionals stay in their positions
for a very long time. - ANSWER-false



Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec
program?

a. Security technician

b. Security officer

c. CISO

d. Security manager - ANSWER-Security manager



It is the responsibility of a _______________________ to develop appropriate InfoSec policies,
standards, guidelines, and procedures. - ANSWER-security manager



A security ____________________ is the typical information security entry-level position. - ANSWER-
technician



Temporary hires called contract employees - or simply contractors - should not be allowed to do what?

a. Compensated by the organization based on hourly rates

b. Visit the facility without specific, prior coordination

c. Work on the premises

d. Wander freely in and out of buildings - ANSWER-Wander freely in and out of buildings



Which of the following security certifications is considered the most prestigious for security managers
and CISOs?

a. SSCP

b. SCP

c. GIAC

d. CISSP - ANSWER-CISSP

, Which of the following is NOT a task that must be performed if an employee is terminated?

a. Former employee's home computer must be audited

b. Former employee must return all media

c. Former employee should be escorted from the premises

d. Former employee's office computer must be secured - ANSWER-Former employee's home computer
must be audited



A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical
actions is known as racketeering - ANSWER-false



The intermediate area between trusted and untrusted networks is referred to as which of the following?

a. Semi-trusted area

b. Unfiltered area

c. Demilitarized zone

d. Proxy zone - ANSWER-Demilitarized zone



Which of the following biometric authentication systems is considered to be the most secure?

a. Fingerprint recognition

b. Retina pattern recognition

c. Signature recognition

d. Voice pattern recognition - ANSWER-Retina pattern recognition



In which cipher method are values rearranged within a block to create the ciphertext?

a. Permutation

b. Vernam

c. Monoalphabetic

d. Substitution - ANSWER-Permutation



Which of the following access control processes confirms the identity of the entity seeking access to a
logical or physical area?

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Settings. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $27.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$27.99
  • (0)
  Add to cart