NT2580 Final Study Guide Essay

1432 Words Dec 1st, 2013 6 Pages
Nt2580
FINAL EXAM: Study Guide
1. Which of the following is an action that could damage an asset? (Page 6)
-Threat - Any action that could damage an asset.
2. Which law requires all types of financial institutions to protect customers’ private financial information? (Page 9)
-Gramm-Leach Bliley Act(GLBA - Passed in 1999,
3. An AUP is part of a layered approach to security, and it supports confidentiality. What else supports confidentiality? (Page 14)
Protecting Private Data - The process of ensuring data confidentiality.
4. Which of the following is a detailed written definition of how software and hardware are to be used? (Page 40)
-Standard - A detailed written definition for hardware and software and how it is to be used.
…show more content…
30. What does risk management directly affect? (Page 252, 253)
- Risk Management - Directly affects security controls
31. Which of the following is a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A? (Page 235)
- Caesar
32. Identify a security objective that adds value to a business. (Page 286)
- Authorization - Adds value to a business.
33. Which of the following is an asymmetric encryption algorithm? (Page 305)
- Rivest-Shamir-Adelman RSA - An Asymmetric Encryption Algorithm.
34. Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature. (Page 312)
- Nonrepudiation - Which security principle can you satisfy with an asymmetric digital signature but not a symmetric one?
35. Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation? (Page 280)
-Cryptography - Accomplishes Four Security Goals: Confidentiality, Integrity, Authentication, Nonrepudiation
36. In which OSI layer do you find FTP, HTTP, and other programs that end users interact with? (Page 318)
- Application Layer - This is responsible for interacting with end users.
37. Identify the configuration that is best for networks with varying security levels, such general users, a group of users working on a secret research project, and a group of executives. (Page 332)
-

Related Documents