Question 21 2 Points Three Main Goals Computer Security Question 21 Options Confidentialit Q26109502

Question 21 (2 points)

Question 21 Unsaved

The three main goals of computer security are:

Question 21 options:

Confidentiality, protection, and reliability.

Confidentiality, integrity, and availability.

Detection, response, and correction.

Confidentiality, performance, and reliability.

Detection, protection, and access control.

Save

Question 22 (2 points)

Question 22 Unsaved

Which of the following considerations is NOT a factor in theeconomics of data protection

Question 22 options:

All of the choices are principal factors

Storage costs

Time to achieve partial or full recovery

Value of data

Point in time recovery requirement (last second, minute, hour,day, …)

Save

Question 23 (2 points)

Question 23 Unsaved

In the context of Information Assurance and Security, the HIPAASecurity Rule requires that individually identifiable patientinformation must be protected.

Which of the following type(s) of safeguards are required by theHIPAA Security Rule.

Question 23 options:

Administrative and Technical safeguards

Technical safeguards

Administrative, Physical, and Technical safeguards

Physical and Technical safeguards

Administrative safeguards

Save

Question 24 (2 points)

Question 24 Unsaved

Within the context of larger organizations, which of thefollowing is NOT a characteristic of role-basedaccess control

Question 24 options:

Simplifies administration when the privileges of users arechanged

Establishes a N:1 relationship between users and accessprivilege assignment

Requires a role engineering activity prior to implementation

All of the choices are characteristics of role-based accesscontrol

Was an approach to access control largely pioneered by the U.S.National Institute of Standards & Technology

Save

Question 25 (2 points)

Question 25 Unsaved

Within the context of Information Assurance and Security, whichof the following offer the most complete set of Black Swanattributes.

Attribute 1 – surprise

Attribute 2 – risk

Attribute 3 – danger

Attribute 4 – statistically likely to occur

Question 25 options:

Attributes 1 and 3

Attributes 1, 2, and 3

Attributes 2 and 4

Attributes 3 and 4

Attributes 1 and 2

Attributes 2, 3, and 4

Save

Question 26 (1 point)

Question 26 Unsaved

Protecting national critical infrastructure requires developingindividual, free-standing plans for each sector and updating themon a regular basis.

Question 26 options:

True
False
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *