IT SECURITY FUNDAMENTALS FINAL EXAM COMPLETE EXAM
SCREENSHOTS REAL QUESTIONS AND CORRECT APPROVED
ANSWERS |ALREADY GRADED A+
What certification focuses on information systems audit, control, and security
professionals?
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Certified in the Governance of Enterprise IT (CGEIT)
Certified in Risk and Information Systems Control (CRISC) - ANSWER: Certified
Information Systems Auditor (CISA)
Joe is the CEO of a company that handles medical billing for several regional hospital
systems. How would Joe's company be classified under the Health Insurance
Portability and Accountability Act (HIPAA)?
Covered entity as a health plan
Covered entity as a healthcare clearinghouse
Covered entity as a provider
Business associate of a covered entity - ANSWER: Business associate of a covered
entity
What level of academic degree requires the shortest period of time to earn and does
NOT require any other postsecondary degree as a prerequisite?
Bachelor's degree
Master's degree
Doctoral degree
Associate's degree - ANSWER: Associate's degree
Federal agencies are required to name a senior official in charge of information
security. What title is normally given to these individuals?
Chief information officer (CIO)
Chief technology officer (CTO)
Chief information security officer (CISO)
Chief financial officer (CFO) - ANSWER: Chief information security officer (CISO)
Which of the following certifications cannot be used to satisfy the security credential
requirements for the advanced Certified Internet Webmaster (CIW) certifications?
Security+
GIAC Certified Firewall Analyst (GCFW)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP) - ANSWER: Certified
Information Security Manager (CISM)
What type of security role is covered by the Committee on National Security Systems
(CNSS) Training Standard CNSS-4012?
, Senior System Manager
System Administrator
Information Assurance Officer
Risk Analyst - ANSWER: Senior System Manager
Betty visits a local library with her young children. She notices that someone using a
computer terminal in the library is visiting pornographic websites. What law requires
that the library filter offensive web content for minors?
Children's Online Privacy Protection Act (COPPA)
Sarbanes-Oxley Act (SOX)
Family Educational Rights and Privacy Act (FERPA)
Children's Internet Protection Act (CIPA - ANSWER: Children's Internet Protection Act
(CIPA)
Erin is a system administrator for a federal government agency. What law contains
guidance on how she may operate a federal information system?
Family Educational Rights and Privacy Act (FERPA)
Federal Information Security Management Act (FISMA)
Gramm-Leach-Bliley Act (GLBA)
Sarbanes-Oxley (SOX) Act - ANSWER: Federal Information Security Management Act
(FISMA)
Tim is implementing a set of controls designed to ensure that financial reports,
records, and data are accurately maintained. What information security goal is Tim
attempting to achieve?
Integrity
Accountability
Availability
Confidentiality - ANSWER: Integrity
Colin is a software developer. He would like to earn a credential that demonstrates
to employers that he is well educated on software security issues. What certification
would be most suitable for this purpose?
Certified Information Systems Security Professional (CISSP)
Certified Secure Software Lifecycle Professional (CSSLP)
Certified Cyber Forensics Professional (CCFP)
HealthCare Certified Information Security Privacy Practitioner (HCISPP) - ANSWER:
Certified Secure Software Lifecycle Professional (CSSLP)
Security training programs typically differ from security education programs in their
focus on ______________.
security topics
hands-on skills
theoretical models
academic courses - ANSWER: hands-on skills
SCREENSHOTS REAL QUESTIONS AND CORRECT APPROVED
ANSWERS |ALREADY GRADED A+
What certification focuses on information systems audit, control, and security
professionals?
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Certified in the Governance of Enterprise IT (CGEIT)
Certified in Risk and Information Systems Control (CRISC) - ANSWER: Certified
Information Systems Auditor (CISA)
Joe is the CEO of a company that handles medical billing for several regional hospital
systems. How would Joe's company be classified under the Health Insurance
Portability and Accountability Act (HIPAA)?
Covered entity as a health plan
Covered entity as a healthcare clearinghouse
Covered entity as a provider
Business associate of a covered entity - ANSWER: Business associate of a covered
entity
What level of academic degree requires the shortest period of time to earn and does
NOT require any other postsecondary degree as a prerequisite?
Bachelor's degree
Master's degree
Doctoral degree
Associate's degree - ANSWER: Associate's degree
Federal agencies are required to name a senior official in charge of information
security. What title is normally given to these individuals?
Chief information officer (CIO)
Chief technology officer (CTO)
Chief information security officer (CISO)
Chief financial officer (CFO) - ANSWER: Chief information security officer (CISO)
Which of the following certifications cannot be used to satisfy the security credential
requirements for the advanced Certified Internet Webmaster (CIW) certifications?
Security+
GIAC Certified Firewall Analyst (GCFW)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP) - ANSWER: Certified
Information Security Manager (CISM)
What type of security role is covered by the Committee on National Security Systems
(CNSS) Training Standard CNSS-4012?
, Senior System Manager
System Administrator
Information Assurance Officer
Risk Analyst - ANSWER: Senior System Manager
Betty visits a local library with her young children. She notices that someone using a
computer terminal in the library is visiting pornographic websites. What law requires
that the library filter offensive web content for minors?
Children's Online Privacy Protection Act (COPPA)
Sarbanes-Oxley Act (SOX)
Family Educational Rights and Privacy Act (FERPA)
Children's Internet Protection Act (CIPA - ANSWER: Children's Internet Protection Act
(CIPA)
Erin is a system administrator for a federal government agency. What law contains
guidance on how she may operate a federal information system?
Family Educational Rights and Privacy Act (FERPA)
Federal Information Security Management Act (FISMA)
Gramm-Leach-Bliley Act (GLBA)
Sarbanes-Oxley (SOX) Act - ANSWER: Federal Information Security Management Act
(FISMA)
Tim is implementing a set of controls designed to ensure that financial reports,
records, and data are accurately maintained. What information security goal is Tim
attempting to achieve?
Integrity
Accountability
Availability
Confidentiality - ANSWER: Integrity
Colin is a software developer. He would like to earn a credential that demonstrates
to employers that he is well educated on software security issues. What certification
would be most suitable for this purpose?
Certified Information Systems Security Professional (CISSP)
Certified Secure Software Lifecycle Professional (CSSLP)
Certified Cyber Forensics Professional (CCFP)
HealthCare Certified Information Security Privacy Practitioner (HCISPP) - ANSWER:
Certified Secure Software Lifecycle Professional (CSSLP)
Security training programs typically differ from security education programs in their
focus on ______________.
security topics
hands-on skills
theoretical models
academic courses - ANSWER: hands-on skills