IT-6205A - Information Assurance and Security oed answer key

Showing 241 to 260 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Those who will seechange to their capability and work with core units but are otherwise notdirectly affected

Answer

Identify soft enterprise

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Data and information assets must be confined to people who have authorized access and not disclosed to others

Answer

Confidentiality

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Determinewho are the legitimate actors who will interact with theproduct/service/process. What phase is that?

Answer

Phase B: Business Architecture

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Walk without purpose, scan the area around you and make casual eye contact with others to display confidence.

Answer

False

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

CIA stands for , integrity, and availability and these are the three main objectives of information security.

Answer

confidentiality

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Education will better familiarize authorized persons with risk factors and how to defend themselves from them.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

In Stateful Packet Filtering, the connection pairs is consists of the following parameters except ___________.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

MTTR is the time that it takes for the service provider to repair the fault. Often this is defined in minutes.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

When a new server is added to the server group, the load balancer automatically starts to send requests to it.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is a comprehensive strategy that helps business processes to restart or proceed despite a security incident.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The terms protection of information, cyber protection, and information assurance are also used interchangeably.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It can provide a collection of specifications and procedures that are not only documentable but also repeatable.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security analysts typically include the use of Hashing Algorithms such as MD5 and SHA1 to verify data integrity.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security architecturecalls for its own unique set of skills and competencies of the enterprise andIT architects.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

is a requirement whose purpose is to keep sensitive information from being disclosed to unauthorized recipients.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A ____________________ must recognize the assets of an organization as well as all possible risks to those assets

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Physical security consist in the closure of IT equipment in a dedicated spaceand the provision of access control.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Safety managers assess the capabilities and limitations of their IT and information infrastructure organizations.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

This involves ensuring that the are who they say are and one of the most famous method to secure this is by using

Page 13 of 21