IT-6205A - Information Assurance and Security oed answer key
Showing 221 to 240 of 413 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
True or FalseUnclear security roles and responsibilities need to be established for all company users.
Answer
False
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The substantiation ofthe identity of a person or entity related to the enterprise or system in someway.
Answer
Authentication
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
________ :assuring that information and programs are changed only in a specified and authorized manner.
Answer
Integrity
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A network assurance technology called the _______________________ was launched by Cisco in January 2018.
Answer
Network Assurance Engine
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Each __________ is equipped with a particular routing protocol associated with the purpose of that port.
Answer
router port
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It should be avoided, and writers should be careful to use the proper meaning of terms or generic words.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Network vulnerabilities cause threats such as spyware and malware to become part of a company's network.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The emphasis should still be on retrofitting tools to meet current safety requirements, not development.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The security manager is responsible for achieving balance and effectively supporting corporate security.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_____________________ hackers edit the HTML of a website for fun or ideological purposes to vandalize it.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
In the information world, the National Institute of Standards and Technology has described cyberspace as:
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
OPSEC planning does not require a clear understanding of the activity's mission and organizational plans.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Taking actions toreduce the losses due to a risk; manytechnical countermeasures fall into this category.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
______________________________ of consumer and business information are the most important considerations.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A domain name is an easy way to remember an address, but it has to be translated to its digital IP format.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Is the process by whichan asset is managed from its arrival orcreation to its termination or destruction.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The firewall can ____________ any traffic or all traffic, depending on the firewall policy of the company.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
True or FalseIdentity Management is an integrated system of company policies, processes, and technologies.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1