IT-6205A - Information Assurance and Security oed answer key
Showing 181 to 200 of 413 total answers.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Criminals are constantly surveying the environment for an opportunity to commit crimes.
Answer
True
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Day-to-day processes, such as threat and vulnerability management and threat management.
Answer
Operations and Monitoring
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Security control and network control should not be the responsibility of the same group.
Answer
Dual Control
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_____________________ divert all traffic or workload to a backup device in this scenario.
Answer
Security analysts
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Although proxy firewalls secure clients in general, servers are secured by _____________.
Answer
WAF
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ______________ can be deployed inside the house, which is also called a home network.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Data is private if this can only be done for the individuals who are allowed to access it.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Security architectureaddresses non-normative flows through systems and among applications.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Theft of personal items such as pursues can result in more criminal opportunities such as:
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
The aim of is to ensure that information is hidden from people unauthorized to access it.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Availability such as data encryption and hashing is applied using authentication protocols.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It is a type of OPSEC problem that is deliberate but varies in its degree of maliciousness.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
_______ : assuring that authorized users have continued access to information and resources
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
______________ requires assurance that all systems of information are secure and not abused.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The vulnerability process is intended to find exploitable flaws in a company's data network.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The_______________ is a symmetric key algorithm used to safeguard secret government records.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
What was the team that led the military operation in coining the term "operations security"?
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A main and basic type of network protection firewall is a stateful packet-filtering firewall.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1