Order information security concept

Order information security concept
What NIST special publication 800 covers Bluetooth security?
a.
800-83 Rev. 1
b.
800-94 Rev. 1
c.
800-121 Rev. 1
d.
800-88 Rev. 1
Your company has been fined for a breach in security, and the fine will be $1.5 million/year. Which law did you break?
a.
SOX
b.
IEEE
c.
HIPAA
d.
PCI DDS
This organization was formed in 1906 to address issues with expanding technologies related to electrical devices.
a.
IEC
b.
RFC
c.
IEEE
d.
IETF
George W. Bush called this act the most far-reaching reforms for American business practices. Which act is he referring to?
a.
GLBA
b.
SOX
c.
HIPAA
d.
CIPA
An alternative method used to document operational specifications is known as:
a.
Standard
b.
Request for comments
c.
Best current practice
d.
Draft standard
This act made DHS responsible for developing and ensuring federal government-wide compliance.
a.
HIPAA
b.
NIST
c.
FISMA
d.
SOX
When dealing with IEEE 802 standards, what standard covers radio regulatory?
a.
802.11
b.
802.16
c.
802.3
d.
802.18
HIPAA also applies to the ______________ of covered entities.
What standards institute was formed with the merger of five engineering societies and three government agencies?
a.
ANSI
b.
IEEE
c.
ISO
d.
ETSI
What regulation was released to provide a catchall update to HIPAA and HITECH act rulings?
a.
Omnibus
b.
Gramm-Leach
c.
EPHI
d.
OCR
ISO17799 has 10 major sections. Name five of them.
What addresses the privacy and security of consumer financial information?
a.
CIPA
b.
SOX
c.
GLBA
d.
FISMA
You are building out a share drive and want to ensure that it is always accessible. What is your primary focus?
a.
Availability
b.
Privacy
c.
Integrity
d.
Confidentiality
nternal controls and information security goals have steps that must be taken. What step has the goal of confidentiality?
a.
Reports are maintained for the maximum allowable time.
b.
Unauthorized acquisition or use of data or assets that could affect financial statements.
c.
Financial reports, records, and data are accurately maintained.
d.
Transactions are prepared according to GAAP rules.
A formal method of identifying and classifying risk is known as…
a.
Security policy
b.
Risk assessment
c.
Access control
d.
Asset management
What layer of the OSI model is concerned with process to process communication?
a.
Network
b.
Presentation
c.
Session
d.
Data link
Which industry is concerned with credit card payments?
a.
PCI DSS
b.
Visa
c.
IEC 27002
d.
American Express
A statement of management direction is known as…
a.
Security policy
b.
Risk assessment
c.
Standards
d.
Personnel security
Which law and information security concept is concerned with integrity?
a.
PCI DDS v 3.1
b.
CIPA
c.
SOX
d.
GLBA
Which NIST covers computer security incident handling?
a.
800-61 Rev. 1
b.
800-61
c.
800-Rev. 3
d.
800-61 Rev. 2

Still stressed from student homework?
Get quality assistance from academic writers!
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 9294730077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code HURRAY