IS3350 Final Exam - IS3350: Security Issues in Legal...

  • ITT Tech
  • IS 3350
  • Test Prep
  • fatninja
  • 15
  • 89% (27) 24 out of 27 people found this document helpful

This preview shows page 1 - 4 out of 15 pages.

IS3350: Security Issues in Legal ContextFinal Exam1.The main goal of Information Security is to protect information _____________.a.authentication, information, and confidentialityb.integration, auditing, and contentc.availability, integrity, and confidentialityd.authorization, authentication and, auditing
2._____________ is the rule that requires that two or more employees must split critical taskfunctions so that no employee knows all of the steps of the critical task.
3.When a person or system takes advantage of a vulnerability to cause harm, it is called a/an__________.
4.Organizations respond to risks by doing _____________.
5.________ are the first level of information governance.a.Standardsb.Policies
IS3350 Security Issues in Legal ContextFINAL EXAMc.Rulesd.Guidelines6.Which of the following programs retrieves files and data from a computer network?
7.Individuals use a blog as a personal online journal. Which of the following is the source ofthe word “blog”?
8.Which of the following implies that a person has the right to specify how his/her personallyidentifiable information data is collected, used, and shared?
9.Which of the following acts establishes the public’s right to request information fromfederal agencies?a.The Fourth Amendmentb.The Electronic Communications Privacy Act (1986)c.The Privacy Act (1974)d.The Freedom of Information Act (1966)
10.Which of the following is a small string of non-executable text that a Web site stores on auser’s computer, containing information about the individuals visit to the Web site, such asuser name and password?
a.Spywareb.Adwarec.Cookied.Key logger11.The President must be a natural-born U.S. citizen and must be at least ___________ yearsold.
12.Which of the following is a body of law developed through legal tradition and court cases?

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 15 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
FLECTHER
Tags
Information Security, ITT Educational Services, legal context

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture