CYB 155 Exam 2 (Modules 5-7)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The _____ is a respected professional society that was established in 1947. Today it is "the world's largest educational and scientific computing society. - Association for Computing Machinery - Information Systems Security Association (ISSA) - International Information Systems Security Certification Consortium, Inc. - EC-Council

Association for Computing Machinery

The Cybersecurity Analyst+ certification from _____ is an intermediate certification with both knowledge-based and performance-based assessment. - SANS - CompTIA - ACM - ISACA

CompTIA

CompTIA offers a vendor-specific certification program called the Security+ certification. T/F

False

The (ISC)2 CISSP concentrations are available for currently certified CISSP professionals to demonstrate knowledge that is part of the CISSP common body of knowledge. T/F

False

The (ISC)2 CISSP-ISSEP concentrationfocuses on the knowledge area including systems lifecycle management, threat intelligence and incident managements. T/F

False

The Council of Europe Convention on Cybercrime has not been well received by advocates of intellectual property rights because it de-emphasizes prosecution for copyright infringement. T/F

False

The security manager position is much more general than that of the CISO. T/F

False

an after-action review is an opportunity for everyone who was involved in planning for an incident or disaster to sit down and discuss what will happen when the plan is implemented. T/F

False

an attack, breach of policy, or other incident always constitutes a violation of law, requiring notification of law enforcement. T/F

False

incident detail assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets. T/F

False

procedures are planned for each identified incident scenario with incident handling procedures established for before and during the incident. T/F

False

reported attacks are a definite indicator of an actual incident. T/F

False

root cause analysis is the coherent application of methodical investigatory techniques to present evidence of crimes in a court or similar setting. T/F

False

What is the subject of the Computer Security Act of 1987? - Federal agency information security - Telecommunications common carriers - Cryptography software vendors - All of the other answers are correct

Federal agency information security

There are three general causes of unethical and illegal behavior: _____, Accident, and Intent. - Curiosity - Ignorance - Revenge - None of the other answers are correct

Ignorance

The former System Administration, Networking, and Security Organization is now better known as _____. - SANO - SANSO - SANS - SAN

SANS

the CPMT should include a ______ who is a high-level manager to support, promote, and endorse the findings, and endorse the findings of the project and could be the COO or (ideally) the CEO/president. - project instigator - executive-in-charge - champion - project manager

champion

ideally, the ____, systems administrators, the chief information security officer (CISO), and key IT and business managers should be actively involved during the creation and development of all CP components. - chief executive officer (CEO) - senior auditor - chief financial officer (CFO) - chief information officer (CIO)

chief information officer

the transfer of large batches of data to an off-site facility, usually through leased lines of services, is called ______. - off-site storage - databases shadowing - electronic vaulting - remote journaling

electronic vaulting

Many organizations use a(n) _____ interview to remind the employee of contractual obligations, such as nondisclosure agreements, and to obtain feedback on the employee's tenure in the organization. - exit - departure - termination - hostile

exit

The latest forecasts for information security-related positions expect _____ openings than in many previous years.. - fewer - more - many fewer - the same number of

more

Security managers accomplish _____ identified by the CISO and resolve issues identified by technicians - strategies - objectives - tactics - tasks

objectives

which type of organizations should prepare for the unexpected? - large organizations which have many assets at risk - small organizations that can easily recover - only those without good insurance - organizations of every size and purpose should also prepare for the unexpected

organizations of every size and purpose should also prepare for the unexpected

Laws, policies, and their associated penalties only provide deterrence if which of the following conditions is present? - Fear of penalty - Probability of being caught - Probability of penalty being administered - All of the other answers are correct

All of the other answers are correct

Many who enter the field of information security are technical professionals such as _____ who find themselves working on information security applications and processes more often than traditional IT assignments. - All of the other answers are correct - networking experts or systems administrators - database administrators - programmers

All of the other answers are correct

The information security function can be placed within the _____. - legal department - administrative services function - All of the other answers are correct - insurance and risk management function

All of the other answers are correct

The ISSMP concentration examination is designed to provide CISSPs with a mechanism to demonstrate competence in _____. - business continuity planning and disaster recovery planning - security management practices - enterprise security management practices - All of these answers are correct

All of these answers are correct

According to Schwartz, "_____" are the real techies who create and install security solutions. - Builders - Administrators - Engineers - Definers

Builders

The _____ is the title most commonly associated with the top information security officer in the organization. - CEO - CISO - CTO - CFO

CISO

The (ISC)2 _____ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the basic certification's common body of knowledge. - CISM - CISA - C|CISO - CISSP

CISSP

The breadth and depth covered in each of the domains makes the _____ one of the most difficult-to-attain certifications on the market. - Security+ - CISSP - ISEP - CISA

CISSP

In some organizations, the CISO's position may be combined with physical security responsibilities or may even report to a security manager who is responsible for both logical (information) security and physical security and such a position is generally referred to as a _____. - CSO - CTO - CPSO - CNSO

CSO

_____ law comprises a wide variety of laws pertaining to relationships among individuals and organizations. - Criminal - Civil - Statutory - Constitutional

Civil

The National Information Infrastructure Protection Act of 1996 modified which act? - USA PATRIOT Act - USA PATRIOT Improvement and Reauthorization Act - Computer Security Act - Computer Fraud and Abuse Act

Computer Fraud and Abuse Act

Which of the following acts defines and formalizes laws to counter threats from computer-related acts and offenses? - Electronic Communications Privacy Act of 1986 - Freedom of Information Act (FOIA) of 1966 - Computer Fraud and Abuse Act of 1986 - All of the other answers are correct

Computer Fraud and Abuse Act of 1986

Payment Card Industry _____ Standards are designed to enhance the security of customers' payment card account data. - Data Safety - Data Security - Data Practices - Account Security

Data Security

The _____ attempts to prevent trade secrets from being illegally shared. - Electronic Communications Privacy Act - Sarbanes-Oxley Act - Financial Services Modernization Act - Economic Espionage Act

Economic Espionage Act

Which of the following acts is a collection of statutes that regulate the interception of wire, electronic, and oral communications? - Electronic Communications Privacy Act - Financial Services Modernization Act - Sarbanes-Oxley Act - Economic Espionage Act

Electronic Communications Privacy Act

_____ use allows copyrighted materials to be used to support news reporting, teaching, scholarship, and similar activities, if the use is for educational or library purposes, is not for profit, and is not excessive. - Justified - Fair - Personal - Limited

Fair

A key difference between a policy and a law is that ignorance of a law is an acceptable defense. T/F

False

A(n) alarming event is an event with negative consequences that could threaten the organization's information assets or operations T/F

False

Changes to systems logs are a possible indicator of an actual incident. T/F

False

Cultural differences can make it difficult to determine what is ethical and not ethical between cultures, except when it comes to the use of computers, where ethics are considered universal. T/F

False

Database shadowing duplicates data in real-time data storage, but does not back up the databases at the remote site. T/F

False

Existing information security-related certifications are typically well understood by those responsible for hiring in organizations. T/F

False

Organizations are not required by law to protect employee information that is sensitive or personal. T/F

False

a recovery time objective (RTO) is the total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption. T/F

False

a(n) disaster is an adverse event that could result in a loss of an information asset or assets, but does not currently threaten the viability of the entire organization T/F

False

a(n) disaster recovery plan includes the steps necessary to ensure the continuation of the organization when a disaster's scope or scale exceeds the ability of the organization to restore operations, usually through relocation of critical business function to an alternate location T/F

False

an affidavit is permission to search for evidentiary material at a specified location or to seize items to return to an investigator's lab for examination. T/F

False

an external event is an event with negative consequences that could threaten the organization's information assets or operations; also referred to as an incident candidate. T/F

False

an incident is an adverse event that could result in a loss of information assets and threatens the viability of the entire organization. T/F

False

crisis response is an organization's set of planning and preparation efforts for dealing with potential human injury, emotional, trauma, or loss of life as a result of a disaster. T/F

False

Which of the following acts is also widely known as the Gramm-Leach-Bliley Act? - Financial Services Modernization Act - Communications Act - Computer Security Act - Health Insurance Portability and Accountability Act

Financial Services Modernization Act

What is the subject of the Sarbanes-Oxley Act? - Banking - Financial reporting - Privacy - Trade secrets

Financial reporting

The Computer _____ and Abuse Act of 1986 is the cornerstone of many computer-related federal laws and enforcement efforts. - Violence - Fraud - Theft - Usage

Fraud

_____ is a professional association that focuses on auditing, control, and security. The membership comprises both technical and managerial professionals. - ISACA - Information Systems Security Association (ISSA) - EC-Council - SANS

ISACA

In 2001, the Council of Europe drafted the European Council Cybercrime Convention, which empowers an international task force to oversee a range of security functions associated with _____ activities. - online terrorist - electronic - cyberactivist - Internet

Internet

The Health Insurance Portability and Accountability Act of 1996, also known as the _____ Act, protects the confidentiality and security of health-care data by establishing and enforcing standards and by standardizing electronic data interchange. - Gramm-Leach-Bliley - Kennedy-Kessebaum - Privacy - HITECH

Kennedy-Kessebaum

The Digital _____ Copyright Act is the American contribution to an international effort by the World Intellectual Properties Organization (WIPO) to reduce the impact of copyright, trademark, and privacy infringement. - Management - Master - Information - Millennium

Millennium

_____ law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments. - Public - Private - Civil - Criminal

Public

_____ uses a number of hard drives to store information across multiple drive units. - RAID - continuous database protection - legacy backup - virtualization

RAID

_____ are the technically qualified individuals tasked to configure firewalls, deploy IDSs, implement security software, diagnose and troubleshoot problems, and coordinate with systems and network administrators to ensure that an organization's security technology is properly implemented. - CISOs - CSOs - Security analysts - Security managers

Security analysis

The _____ of 1999 provides guidance on the use of encryption and provides protection from government intervention. - Prepper Act - Economic Espionage Act - USA PATRIOT Act - Security and Freedom through Encryption Act

Security and Freedom through Encryption Act

_____ is a cornerstone in the protection of information assets and in the prevention of financial loss. - Fire suppression - Separation of duties - Business separation - Collusion

Separation of duties

In the 1999 study of computer use-ethics, which of the following countries reported the least tolerant attitudes toward misuse of organizational computing resources? - Australia - United States - Singapore - Sweden

Singapore

_____ is the requirement that every employee be able to perform the work of another employee. - Two-man control - Collusion - Duty exchange - Task rotation

Task rotation

_____ are hired by the organization to serve in a temporary position or to supplement the existing workforce. - Consultants - Self-employees - Temporary employees - Contractors

Temporary employees

A background check must always be conducted to determine the level of trust the business can place in a candidate for an information security position. T/F

True

In many organizations, information security teams lack established roles and responsibilities. T/F

True

Laws, policies, and their associated penalties only provide deterrence if offenders fear the penalty, expect to be caught, and expect the penalty to be applied if they are caught. T/F

True

Prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment. T/F

True

Security administrators provide day-to-day systems monitoring to support an organization's goals and objectives. T/F

True

Since it was established in January 2001, every FBI field office has started an InfraGard program to collaborate with public and private organizations and the academic community. T/F

True

Studies on ethics and computer use reveal that people of different nationalities have different perspectives; difficulties arise when one nationality's ethical behavior violates the ethics of another national group. T/F

True

The Department of Homeland Security works with academic campuses nationally, focusing on resilience, recruitment, internationalization, growing academic maturity, and academic research. T/F

True

The Secret Service is charged with safeguarding the nation's financial infrastructure and payments systems to preserve the integrity of the economy. T/F

True

The process of integrating information security perspectives into the hiring process includes with reviewing and updating all job descriptions. T/F

True

The recovery point objective (RPO) is the point in time prior to disruption or system outage to which mission/business process data can be recovered after an outage. ______ T/F

True

The use of standardized job descriptions can increase the degree of professionalism in the information security field. T/F

True

To maintain a secure facility, all contract employees should be escorted from room to room, as well as into and out of the facility. T/F

True

an alert message is a description of the incident or disaster that usually contains just enough information so that each person knows what portion of the IR or DR plan to implement without slowing down the notification process. T/F

True

disaster classification is the process of examining an adverse event or incident and determination whether it constitutes an actual disaster. T/F

True

evidentiary material is any information that could potentially support an organization's legal or policy-based case against a suspect. T/F

True

forensics can provide a determination of the source or origin of an event, problem, or issue like an incident. T/F

True

incident classification is the process of examining an adverse event or incident candidate and determining whether it constitutes an actual incident. T/F

True

incident damage assessment is used to determine the impact from a breach of confidentiality, integrity, and availability on information and information assets. T/F

True

incident response is an organization's set of planning and preparation efforts for detecting, reacting to, and recovering from an incident. T/F

True

prior to the development of each of the types of contingency planning documents, the CP team should work to develop the policy environment. T/F

True

the business impact analysis is a preparatory activity common to both CP and risk management. T/F

True

the chain of evidence is the detailed documentation of the collection, storage, transfer, and ownership of evidentiary material from the crime scene through its presentation in court and its eventual disposition. T/F

True

the disaster recovery planning team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters. T/F

True

the organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: protect and forget or apprehend and prosecute. T/F

True

the organization must choose one of two philosophies that will affect its approach to IR and DR as well as subsequent involvement of digital forensics and law enforcement: the two approaches are protect and forget, and apprehend and prosecute. T/F

True

Which of the following is not one of the categories of positions defined by Schwartz? - User - Builder - Administrator - Definer

User

a(n) ________ is a document containing contact information for the people to be notified in the event of an incident - phone list - emergency notification system - alert roster - call registry

alert roster

A fundamental difference between a BIA and risk management is that risk management focuses on identifying threats, vulnerabilities, and attacks to determine which controls can protect information, while the BIA assumes _____ - controls have proven ineffective - controls have failed - controls have been bypassed - all of the above

all of the above

In 2002, Congress passed the Federal Information Security Management Act (FISMA), which mandates that all federal agencies _____. - provide security awareness training - periodic assessment of risk - develop policies and procedures based on risk assessments - all of the other answers are correct

all of the other answers are correct

the CPMT conducts the BIA in three stages. Which of the following is NOT one of those stages? - determine mission/business processes and recovery critically - identify resource requirements - identify recovery priorities for system resources - all of these are BIA stages

all of these are BIA stages

most common data backup schemes involve ______. - disk-to-disk-to-cloud - neither a nor b - RAID - both a and/or b

both a and/or b

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage _____. - with intent - by accident and/or through unintentional negligence - with malice - none of the other answers are correct

by accident and/or through unintentional negligence

The detailed documentation of the collection, storage, transfer, and ownership of evidentiary material from the crime scene through its presentation in court and its eventual disposition. is called a(n) _____. - evidence affidavit - chain of evidence - search warrant - audit trail

chain of evidence

a ______ site provides only rudimentary services and facilities - hot - cold - warm - commercial

cold

the most common schedule for tape-based backup is a ______ backup, either incremental or differential, with a weekly off-site full backup - hourly off-site - daily on-site - daily off-site - 12-hour-on-site

daily-on-site

______ is the rapid determination of the scope of the breach in the confidentiality, integrity, and availability of information and information assets during or just following an incident. - incident response - containment development - damage assessment - disaster assessment

damage assessment

the storage of duplicate online transaction data, along with the duplication of the databases, at a remote on a redundant server is called _______. - database shadowing - electronic vaulting - application recovery - remote journaling

database shadowing

a crime involving digital media, computer technology, or related components may best be called an act of ______. - digital malfeasance - digital abuse - computer theft - computer trespass

digital malfeasance

the process of examining an adverse event or incident and determining whether it constitutes an actual disaster in known as _____. - disaster indication - disaster classification - event escalation - incident review

disaster classification

an organization aggrgates all local backups to a central repository and then backs up that repository to an online vendor with a _____ backup strategy - RAID - differential - disk-to-disk-to-cloud - disk-to-disk-to-tape

disk-to-disk-to-cloud

In most cases, organizations look for a technically qualified information security _____ who has a solid understanding of how an organization operates. - specialist - expert - internist - generalist

generalist

a resumption location known as a ______ is a fully configured computer facility capable of establishing operations at a moment's notice. - mobile site - hot site - service bureau - cold site

hot site

The unauthorized taking of person information with the intent of committing fraud and abuse of a person's financial and personal reputation, purchasing goods and services without authorization, and generally impersonating the victim for illegal or unethical purposes.is known as _____. - non-criminal fraud - ransoming - identity theft - identity extortion

identity theft

Criminal or unethical _____ goes to the state of mind of the individual performing the act. - ignorance - intent - accident - all of the other answers are correct

intent

The ISSEP concentration allows CISSP certificate holders to demonstrate expert knowledge of all of the following except _____. - international laws - certification and accreditation/risk management framework - technical management - systems security engineering

international laws

the total amount of time the system owner or authorizing official is willing to accept for a business process outage or disruption is _______. - recovery time objective (RTO) - recovery point objective (RPO) - work recovery time (WRT) - maximum tolerable downtime (MTD)

maximum tolerable downtime (MTD)

Many who move to business-oriented information security were formerly_____ who were often involved in national security or cybersecurity. - business analysts - lawyers - military personnel - marketing managers

military personnel

a potential disadvantage of a timeshare site-resumption strategy is: - more than one organization might need the facility - more expensive than other options - requires additional investment in time and technology to get up to speed in the event of a disaster - all of the above

more than one organization might need the facility

Information about a person's history, background, and attributes that can be used to commit identity theft is known as _____ information. - virtually interpreted - privately held - personally identifiable - identity defined

personally identifiable

The transfer of transaction data in real time to an off-site facility is called ______. - database shadowing - electronic vaulting - off-site storage - remote journaling

remote journaling

data backup should be based on a(n) _____ policy that specifies how long log data should be maintained. - retention - business resumption - incident response - replication

retention

a _____ is a contractual document guaranteeing certain minimal levels of service provided by a vendor. - time-share agreement - mutual agreement - service agreement - memorandum of understanding

service agreement

which of these is the primary reason contingency response teams should not have overlapping membership with one person on multiple teams? - to allow people to specialize in one area - to avoid cross-division rivalries - so individuals don't find themselves with different responsibilities in different locations at the same time - to spread the work out among more people

so individuals don't find themselves with different responsibilities in different locations at the same time

According to the National Information Infrastructure Protection Act of 1996, the severity of the penalty for computer crimes depends on the value of the information obtained and whether the offense is judged to have been committed for each of the following except _____. - for purposes of commercial advantage - for private financial gain - to harass - in furtherance of a criminal act

to harass

The SSCP examination is much more rigorous than the CISSP examination. T/F

False

The United States has implemented a version of the DMCA law called the Database Right, in order to comply with Directive 95/46/EC. T/F

False

a business influence analysis (BIA) is an investigation and assessment of adverse events that can affect the organization. T/F

False

a business policy is a task performed by an organization's overall mission and operations. T/F

False

a disaster recovery plan shows the organization's intended efforts to establish operations at an alternate site in the aftermath of a disaster. T/F

False

a planning check is a testing strategy in which copies of the appropriate plans are distributed to all individuals who will be assigned roles during an actual incident or disaster. T/F

False

an after-action re-assessment is an opportunity for everyone who was involved in an incident or disaster to sit down and discuss what happened. T/F

False

the business impact analysis is a preparatory activity common to both CP and risk management T/F

False

the computer security incident response team in composed solely of technical IT professionals who are prepared to detect, react to, and recover from an incident. T/F

False

the continuity planning management team (CPMT) is the group of senior managers and project members organized to conduct and lead all contingency planning efforts. T/F

False

the disaster recovery preparation team (DRPT) is the team responsible for designing and managing the DR plan by specifying the organization's preparation, response, and recovery from disasters. T/F

False

the total time needed to place the business function back in service must be longer than the maximum tolerable downtime. T/F

False

the work response time (WRT) is the amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered. T/F

False

two ways to activate an alert roster are simultaneously and in parallel. T/F

False

use of dormant accounts is a probable indicator of an actual incident. T/F

False

a(n) DR plan ensures that critical business functions continue if a catastrophic incident or disaster occurs T/F

False - Business Continuity Plan (BCP)

A cold site provides many of the same services and options of a hot site, but at a lower cost T/F

False - a cold site only has rudimentary services

a(n) sequential roster is activated as the first person calls a few people on the roster, who in turn call a few other people T/F

False - hierarchical

An organization should integrate security awareness education into a new hire's ongoing job orientation and make it a part of every employee's on-the-job security training. T/F

True

Criminal laws address activities and conduct harmful to society and are categorized as public law. T/F

True

In many cases, organizations look for a technically qualified information security generalist who has a solid understanding of how an organization operates. T/F

True

Individuals with authorization and privileges to manage information within the organization are most likely to cause harm or damage by accident. T/F

True

a business process is a task performed by an organization or one of its units in support of the organization's overall mission and operations. T/F

True

a business process is a task performed by and organization or one of its units in support of the organization's overall mission and operations T/F

True

a rapid-onset disaster is one that gradually degrades the capacity of an organization contracts with a service agency to provide a facility for a fee. T/F

True

a service bureau is an agency that provides a service for a fee T/F

True

an affidavit is a sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place. T/F

True

reported attacks are a probable indicator of an actual incident. T/F

True

the process of examining an incident candidate and determining whether it constitutes an actual incident is called incident classification. T/F

True

the work recovery time (WRT) is the amount of effort (expressed as elapsed time) needed to make business functions work again after the technology element is recovered. T/F

True

using a service bureau is a BC strategy in which an organization contracts with a service agency to provide a facility for a fee. T/F

True

The _____ defines stiffer penalties for prosecution of terrorism-related activities. - USA PATRIOT Act - Sarbanes-Oxley Act - Gramm-Leach-Bliley Act - Economic Espionage Act

USA PATRIOT Act

The CISA credential is promoted by ISACA as the certification that is appropriate for all but which type of professionals? - accounting - auditing - security - networking

accounting

the sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place is called a(n) ______. - affidavit - writ of habeas corpus - sworn warrant - search warrant

affidavit

To assess the effect that changes will have on the organization's personnel management practices, the organization should conduct a behavioral feasibility study before the program is _____. - planned - budgeted - considered - implemented

implemented

The model commonly used by large organizations places the information security department within the _____ department. - physical security - management - information technology - production

information technology

each of the following is a role for the crisis management response team EXCEPT: - informing local emergency services to respond to the crisis - keeping the public informed about the event - communicating with major customers and other stakeholders - supporting personnel and their loved ones during the crisis

informing local emergency services to respond to the crisis

Like the CISSP, the SSCP certification is more applicable to the security_____ than to the security _____. - manager, technician - technician, manager - manager, engineer - technician, executive

manager, technician

The Privacy of Customer Information Section of the common carrier regulation states that any proprietary information shall be used explicitly for providing services, and not for any _____ purposes. - troubleshooting - billing - customer service - marketing

marketing

digital forensics involves the _____, identification, extraction, documentation, and interpretation of digital media. - investigation - determination - confiscation - preservation

preservation

the point in time before a disruption or system outage to which business process data can be recovered after an outage is ______. - recovery point objective (RPO) - work recovery time (WRT) - recovery time objective (RTO) - maximum tolerable downtime (MTD)

recovery point objective (RPO)

The maximum amount of time that a system resource can remain unavailable before there is an unacceptable impact on other system resources is ____. - work recovery time (WRT) - recovery time objective (RTO) - recovery point objective (RPO) - maximum tolerable downtime (MTD)

recovery time objective (RTO)

a ________ is an agency that provides physical facilities in the event of a disaster for a fee - service bureau - time-share - mobile site - cold site

service bureau


Kaugnay na mga set ng pag-aaral

Formulas For Cone,cylinder And Sphere

View Set

Introduction of managment pharmacy

View Set

Module 5.2 quiz (chap 10 and 11)

View Set

CCNA 3 v7 Modules 3 - 5: Network Security Exam

View Set

Funda ch 25 Asepsis and infection control PrepU

View Set

A&P 2 Chapter 18: Heart (week 2)

View Set