Friday, June 22, 2018

Strayer CIS 324 CIS324 Final Exam Answers (2018)

Strayer CIS 324 CIS324 Final Exam Answers (2018)



BUY HERE


  1.    Which amendment to the U.S. Constitution guarantees defendants a speedy trial?
    2.    _________________ means guilty mind.
    3.    Intentional torts most often occur when the defendant intended to commit the tort. Most torts involving ____________________ are intentional torts.
    4.    Article ___________ of the U.S. Constitution includes provisions for how the government should handle crimes.
    5.    The power of a court to decide certain types of cases is ______________________ jurisdiction.
    6.    _____________________ is a legal concept that means people can be held responsible for their actions even when they didn't intend to cause harm to another person.
    7.    _______________________ criminal law defines the conduct that constitutes a crime and establishes penalties.
    8.    The American legal system is based in large part on ____________________ common law.
    9.    A ______________ protects the formulas, processes, methods, and information that give a business a competitive edge.
    10.    In 1998, Congress passed the _________________________.This law helps protect copyrights in the multimedia world. It also contains provisions that help insulate Internet service providers from the actions of their customers.
    11.    What is not required for an invention or discovery to be patentable?
    12.    Unlike ______________, trade secrets aren't registered. A person or business doesn't have to meet any registration or procedural formalities for protection.
    13.    Patents, trademarks, and copyrights are all types of _________________.
    14.    A trademark has two criteria: 1) it must be used in interstate commerce and 2) _____________________.
    15.    _______________ patents protect the visual appearance of a product.
    16.    Which of the following are types of export control regulations?
    17.    __________________ restrict the transmission of certain types of information to non-U.S. citizens or non-permanent residents who are located in the United States.
    18.    The _________________ requires all federal agencies to create a breach notification plan.
    19.    Which of the following is not one the federal information security challenges the federal CIO spoke of at a House of Representatives subcommittee meeting in March 2010?
    20.    ___________ includes reviewing transaction logs and uses real-time monitoring to find evidence.
    21.    Which of the following is not an exception to the Fourth Amendment's search warrant requirement?
    22.    Which of the following is not a primary analysis area of computer forensics?
    23.    The primary goal of computer forensics is to:
    24.    A judge or jury can consider only __________ evidence when deciding cases.
    25.    When performing computer forensics, what is a potential source of digital evidence?
    26.    Which of the following is not a valid court-recognized exception to search warrant requirements?
    27.    Which of the following is not one of the responsibilities of information security managers?
    28.    A board of directors uses _____________ to set forth its information security plans.
    29.    What type of standard states a minimum level of behavior or actions that must be met to comply with a policy?
    30.    _________________ planning is day-to-day planning that focuses on the normal operations of an organization.
    31.    ______________ planning is short- to medium-term planning that allows an organization to be responsive to market conditions.
    32.    Which of the following steps occurs before any of the others in a formal policy development process?
    33.    Massachusetts' "Standards for the Protection of Personal Information of Residents of the Commonwealth" was released in September 2008 and is known for being "unique" in terms of its data protection standard. Which of the following statements best captures that uniqueness?
    34.    Which of the following statements summarizes why a breach notification is hard for entities?
    35.    What was the first state to have a breach notification law?
    36.    Congress can create laws in areas where the________________ allows it.
    37.    A _____________________ does not require the user to make an affirmative action to accept the terms of the contract. Agreement is assumed when the user visits the Web page or downloads a product.
    38.    ________________ means that the parties to the contract must show that they intended to enter into a specific transaction with specific terms.
    39.    Which of the following lack(s) contractual capacity to enter into a contract:
    40.    To enter into a legally binding contract, you must be at least:
    41.    In forming a contract, the parties must bargain for something of value. This is called ____________________.
    42.    Given the rise of the Internet and e-commerce, online contracts have become very common. One of the unique challenges faced by parties that contract electronically is that parties give up certain rights when they contract online. Which of the following is not one of the rights parties to an online contract forfeit?
    43.    Historically, a contract acceptance had to have exactly the same words and terms as the original offer. This was called _____________________.
    44.    What type of risk assessment uses monetary values to assess a risk?
    45.    According to the NIST, the process of identifying risk, assessing risk, and taking steps to reduce risk to an acceptable level is ___________.
    46.    Which of the following is not typically included in an incident response plan?
    47.    An organization responds to risk according to its:
    48.    One of the main goals of _______________ is to protect an organization's bottom line.
    49.    You are analyzing a risk and have determined that the SLE is $1,200 and the ARO is 3. What is the ALE?
    50.    What type of risk assessment uses descriptive categories to express asset criticality, risk exposure (likelihood), and risk impact?

No comments:

Post a Comment