ISMN 5730 TEST 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

what is the initial requirement to be performed in establishing a BCP?

agree on the scope of the plan

what are the goals of physical security?

deter, delay, detect

digital signatures do not allow for:

confidentiality of the message

a camera located outside a server room door supports which of the following physical security objectives?

detect

digital signatures allow for:

detection of modification of the message, authentication of the sender, 3rd party verification of the sender

a stream mode cipher would be most applicable for which of the following tasks?

encrypting a real-time broadcast of a digital video conference between heads of state

which of the following best describes a hot site:

fully equipped back up center with external interfaces (power, water, etc.) and telecommunications, as well as complete computing. resources on site

which of the following best explains BIA?

it is the process of analyzing all business functions to determine the effect of IT outages in the business

examples of types of physical access controls:

locks, guard stations, gates

which of the following is NOT a key strategy for developing a physical security program?

management support for physical measurements of security

in order of least allowable downtime to most allowable downtime, rank these recovery strategies:

mirror site, hot site, warm site, cold site

the most important goal of any BCP is:

preserve human life

what is the best known example of a symmetric key cipher?

DES

using asymmetric (public key) encryption to provide the recipient of a message with "proof of origin" requires that the sender...

encrypt the message with the sender's private key

which of the following examples would best fit the "Deter" goal of physical security?

a sign on a fence that reads "WARNING: Electrified Fence" that is installed around the HVAC system on the side of a building

which of the following is a key strategy for developing a physical security program?

surveillance for high visual control, controlled flow of movement through limited access, territoriality culture among employees

which of the following is TRUE regarding symmetric cryptography?

the same key is used by both the sender (encryptor) and receiver (decryptor)


Ensembles d'études connexes

Microbiology Exam 1 (Chp. 1, 3, 4, 10)

View Set

EDU 300 - CHAPTER 14 Learners with Physical Disabilities and Other Health Impairments

View Set

Chapter 4 - Network Security Threats and Issues

View Set

Ch: 21 Care of the maternal newborn

View Set

Anatomy Blood Pretest 4 Answers Reonisto

View Set

Chapter 32 disorders of endocrine control

View Set

National Electric Code NEC - Article 310

View Set

Nursing 503 Exam 3 Flashcards from ATI

View Set