Professional Documents
Culture Documents
Info Assurance Security2 Prelim Finals
Info Assurance Security2 Prelim Finals
BY: silentguy
Non-substantial
The need for skilled workers and allocation of funds for security within
their budget: Companies are making the effort to allocate more funds in
their budgets for security.
True
Salary: $95,510
Responsibilities: Information security analysts monitor their companies’
computer networks to combat hackers and compile reports of security
breaches.
True
What jobs in information security is this?
Salary: $104,000
Responsibilities: Create an in-office network for a small business or a
cloud infrastructure for a business with corporate locations in cities on
opposite coasts.
True
Salary: $103,560
Responsibilities: Software developers can be tasked with a wide range
of responsibilities that may include designing parts of computer
programs and applications and designing how those pieces work
together.
Software developer
Regulatory compliances
Salary: $139,000
Responsibilities: Information systems managers work toward ensuring a
company’s tech is capable of meeting their IT goals.
PRELIM EXAM:
The ____________ Layer describes the notion that the physical acess to
any system, server, computer, data center, or another physical object
storing confidential information has to be constrained to business
ought-to-know.
Physical Access
Confidentiality
___________ consists of changing the data located in files into
unreadable bits of characters unless a key to decode the file is provided.
Encryption
Infrastructure Access
cryptography
confidentiality
The establishment of the ___________ rotor machine and the
subsequent emergence of electronics and computing enabled the usage
of much more elaborate schemes and allowed confidentiality to be
protected much more effectively.
Enigma
Confidentiality
Data In Motion
Application Access
CIA stands for _____________, integrity, and availability and these are
the three main objectives of information security.
confidentiality
To continue, confidentiality can be easily breached so each employee in
an organization or company should be aware of his responsibilities in
maintaining confidentiality of the __________ delegated to him for the
exercise of his duties.
information
CIA triad
physical data
MIDTERM QUIZ 3:
MIDTERM QUIZ 4:
MIDTERM EXAM:
FINAL QUIZ 5:
FINAL QUIZ 6:
fusion
Both individuals need to know what data is most critical to the
organization so they can focus on placing the right ___________ and
monitoring controls on that data.
FINAL EXAM:
information security
communicating internal
interchangeable terms
IT security can probably be used interchangeably with cybersecurity,
computer security and information security if _______________.
it pertains to business
Cybersecurity ratings
conversation
information security
IT is the ___________ for practical purposes, largely for industry
(mainframes, supercomputers, datacenters, servers, PCs and mobile
devices as endpoints for worker interaction) and consumers (PCs,
mobile devices, IoT devices, and video game console endpoints for
enduser lifestyles.)