Final Exam.docx - CMIT 425 Question 1(1 point Question 1 Saved pertains to acting responsibly and doing the right thing It is a legal term that defines

Final Exam.docx - CMIT 425 Question 1(1 point Question 1...

This preview shows page 1 - 4 out of 44 pages.

CMIT 425 Question 1 (1 point) Question 1 Saved _________________ pertains to acting responsibly and doing the right thing. It is a legal term that defines the standards of performance that can be expected, either by contract or by implication, in the execution of a particular task. Due care Due diligence Investigation Inspection Question 2 (1 point) Question 2 SavedHow often should a business continuity plan be tested?At least every five yearsOnly when the infrastructure or environment changes Which of the following security controls is intended to fix components or systems after an incident has occurred?DetectiveCompensating What is RAID 5?StripingMirroring During an emergency, if one can't get to the organization's data, which security objective has been compromised?
Image of page 1
Which access control method provides access based on the job a user performs within an organization?Discretionary Access Control (DAC)Lattice Model What type of security classification level requires higher than normal assurance of accuracy and completeness?PublicPrivateTop Secret Which of the following security control processes is in place to ensure that all changes are approved, documented, tested, and properly implemented? Question 8 options: Change control Password control System control Business continuity Question 9 (1 point) Question 9 Saved In one-time pad encryption, the cipher is deemed unbreakable only if all of the following are true about the implementation process EXCEPT: The pad must be used only one time The pad must be as long as the message The pad must be securely distributed and protected at its destination The pad must be made up of truly non-random values Question 10 (1 point) Question 10 Saved Which one of the following technologies can be used to preserve data availability? Encryption for data in transit (IPSec, SSL, PPTP, SSH) Access control (physical and technical) Clustering
Image of page 2
Encryption for data at rest
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 44 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes