100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSIA 300 Final Exam Questions & Answers 100% Verified $16.49   Add to cart

Exam (elaborations)

CSIA 300 Final Exam Questions & Answers 100% Verified

 6 views  0 purchase
  • Course
  • CSIA
  • Institution
  • CSIA

CSIA 300 Final Exam Questions & Answers 100% Verified Which of the following phases of a system development life-cycle is most concerned with authenticating users and processes to ensure appropriate access control decisions? - Correct Answer-Operation and maintenance What is the effect...

[Show more]

Preview 4 out of 57  pages

  • August 25, 2024
  • 57
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSIA
  • CSIA
avatar-seller
TheeGrades
CSIA 300 Final Exam Questions & Answers
100% Verified


Which of the following phases of a system development life-cycle is most

concerned with


authenticating users and processes to ensure appropriate access control

decisions? - Correct


Answer-Operation and maintenance


What is the effective key size of DES? - Correct Answer-56 bit


What are two types of ciphers? - Correct Answer-Transposition and substitution


When block chaining cryptography is used, what type of code is calculated and

appended to the


data to ensure authenticity? - Correct Answer-Message authentication code


Which of the following is the most secure form of triple-DES encryption? -

Correct AnswerDES-EDE3


Cryptography does not help in - Correct Answer-Detecting fraudulent disclosure

, CSIA 300 Final Exam Questions & Answers
100% Verified
All of the following statements about a security incident plan are correct EXCEPT

- Correct


Answer-The plan should be published annually


Two separate employees are required to open a safe containing sensitive

information. One


employee has part of the safe combination, and a second employee has another

part of the safe


combination. This arrangement follows the principle of - Correct Answer-Split

custody


Within the realm of IT security, which of the following combinations best defines


risk? - Correct Answer-Threat coupled with a vulnerability


The purpose of a security incident debrief is all of the following EXCEPT: -

Correct AnswerReview of log files


The primary impact of a pandemic on an organization is: - Correct Answer-Long

periods of

employee absenteeism that impact the organization's ability to provide services

, CSIA 300 Final Exam Questions & Answers
100% Verified
In what phase of a business continuity plan does a company proceed when it is

ready to move


back into its original site or a new site? - Correct Answer-Reconstitution phase


The process of erasing magnetic media through the use of a strong magnetic

field is known as: -


Correct Answer-Degaussing


A security manager has instructed a system administrator to wipe files on a hard

disk. This


means that the administrator needs to: - Correct Answer-Use a tool to overwrite

files multiple


times


Which of the following processes is concerned with not only identifying the root

cause but also


addressing the underlying issue? - Correct Answer-Problem Management


What is the minimum and customary practice of responsible protection of assets

that affects a

, CSIA 300 Final Exam Questions & Answers
100% Verified
community or societal norm? - Correct Answer-Due care


What is one disadvantage of content-dependent protection of information? -

Correct Answerincreases processing overhead


In the event of a security incident, one of the primary objectives of the

operations staff is to


ensure that.. - Correct Answer-there is minimal disruption to the organization's

mission


Which of the following statements pertaining to block ciphers is incorrect? -

Correct AnswerPlain text is encrypted with a public key and decrypted with a

private key.

Cryptography does not help in: - Correct Answer-Detecting fraudulent disclosure


Where is firmware primarily stored on a computer system? - Correct Answer-

Read-only memory


What size is an MD5 message digest (hash)? - Correct Answer-128 bits


Which of the following mail standards relies on a "Web of Trust" ? - Correct

Answer-Pretty

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TheeGrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $16.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$16.49
  • (0)
  Add to cart