IT-6205A - Information Assurance and Security oed answer key

Showing 221 to 240 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or FalseUnclear security roles and responsibilities need to be established for all company users.

Answer

False

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The substantiation ofthe identity of a person or entity related to the enterprise or system in someway.

Answer

Authentication

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

________ :assuring that information and programs are changed only in a specified and authorized manner.

Answer

Integrity

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A network assurance technology called the _______________________ was launched by Cisco in January 2018.

Answer

Network Assurance Engine

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Each __________ is equipped with a particular routing protocol associated with the purpose of that port.

Answer

router port

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It should be avoided, and writers should be careful to use the proper meaning of terms or generic words.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Network vulnerabilities cause threats such as spyware and malware to become part of a company's network.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The emphasis should still be on retrofitting tools to meet current safety requirements, not development.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The security manager is responsible for achieving balance and effectively supporting corporate security.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_____________________ hackers edit the HTML of a website for fun or ideological purposes to vandalize it.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

In the information world, the National Institute of Standards and Technology has described cyberspace as:

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

OPSEC planning does not require a clear understanding of the activity's mission and organizational plans.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Taking actions toreduce the losses due to a risk; manytechnical countermeasures fall into this category.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

______________________________ of consumer and business information are the most important considerations.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A domain name is an easy way to remember an address, but it has to be translated to its digital IP format.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Is the process by whichan asset is managed from its arrival orcreation to its termination or destruction.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The firewall can ____________ any traffic or all traffic, depending on the firewall policy of the company.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or FalseIdentity Management is an integrated system of company policies, processes, and technologies.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It controls the preservation of information, which is one of the many things that a company wants to secure

Page 12 of 21