Computer Networking > AQA Questions and Marking Scheme > CIS 642 FINAL EXAM (All)

CIS 642 FINAL EXAM

Document Content and Description Below

When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD re... quirements. Selected Answer: acce ss Correct Answer: acce ss  Question 2 2 out of 2 points At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Selected Answer: legal classification Correct Answer: legal classification  Question 3 2 out of 2 points A risk exposure is defined as When constructing policies regarding data _______________, it is important that these policies offer particular guidance on separation of duties (SOD), and that there are procedures that verify SOD requirements. Selected Answer: acce ss Correct Answer: acce ss  Question 2 2 out of 2 points At Stanford University, data is labeled according to a classification scheme that identifies information in the following way: prohibited, restricted, confidential, and unrestricted. Which of the following schemes has Stanford adopted? Selected Answer: legal classification Correct Answer: legal classification  Question 3 2 out of 2 points A risk exposure is defined as the impact to the organization when a situation transpires. The widely accepted formula for calculating exposure is as follows: Risk exposure =________________ the event will occur + ____________ if the event occurs Selected Answer: likelihood, impact Correct Answer: likelihood, impact  Question 4 2 out of 2 points One of the most important approaches used to secure personal data is ________________, which is the process used to prove the identity of an individual. ______________, however, is the process used to enable a person’s access privileges. Selected Answer: authentication, authorization Correct Answer: authentication, authorization  Question 5 [Show More]

Last updated: 1 year ago

Preview 1 out of 15 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$12.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
71
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 10, 2021

Number of pages

15

Written in

Seller


seller-icon
acetutor

Member since 2 years

0 Documents Sold


Additional information

This document has been written for:

Uploaded

Aug 10, 2021

Downloads

 0

Views

 71

Document Keyword Tags


$12.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·