The use of encryption and digital signatures helps ensure that what was transmitted is the same as what was received. Which of the following is assured?
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
The concept of “need to know” is most closely associated with which of the following?
What is the primary goal of business process reengineering?
To develop new security policies
To improve business processes
To implement an enterprise resource system
To determine management bonuses
An unauthorized user accessed protected network storage and viewed personnel records. What has been lost?
What does COBIT stand for?
Control Objectives for Information and Related Technology
Common Objects for Information and Technology
Common Objectives for Information and Technology
Control Objects for Information Technology
What does “tone at the top” refer to?
Policies, in relation to standards, procedures, and guidelines
Confidentiality in the C-I-A triad
Regulatory bodies, in relation to security policies and controls
Which of the following types of security controls stops incidents or breaches immediately?
None of the above
An encryption system is an example of which type of security control?
Security controls fall into three design types: preventive, detective, and:
Which of the following is not a generally accepted principle for implementing a security awareness program?
Competency should be measured.
Remind employees of risks.
Leaders should provide visible support.
None of the above.
Of the following compliance laws, which focuses most heavily on personal privacy?
To which sector does HIPAA apply primarily?
None of the above
Which law was challenged by the American Library Association and the American Civil Liberties Union claiming it violated free speech rights of adults?
To which sector does the Sarbanes-Oxley Act apply primarily?
Publically traded companies
Which compliance law concept states that only the data needed for a transaction should be collected?
Limited use of personal data
Role-based access control
Virtual private networking
Software as a Service
Which of the following is not true of segmented networks?
By limiting certain types of traffic to a group of computers, you are eliminating a number of threats.
Switches, routers, internal firewalls, and other devices restrict segmented network traffic.
A flat network has more controls than a segmented network for limiting traffic.
Network segmentation limits what and how computers are able to talk to each other.
In which domain is virtual private networking a security control?
Remote Access Domain
Both A and B
Neither A nor B