IT-6205A - Information Assurance and Security oed answer key
Showing 241 to 260 of 413 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Those who will seechange to their capability and work with core units but are otherwise notdirectly affected
Answer
Identify soft enterprise
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Data and information assets must be confined to people who have authorized access and not disclosed to others
Answer
Confidentiality
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Determinewho are the legitimate actors who will interact with theproduct/service/process. What phase is that?
Answer
Phase B: Business Architecture
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Walk without purpose, scan the area around you and make casual eye contact with others to display confidence.
Answer
False
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
CIA stands for , integrity, and availability and these are the three main objectives of information security.
Answer
confidentiality
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Education will better familiarize authorized persons with risk factors and how to defend themselves from them.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
In Stateful Packet Filtering, the connection pairs is consists of the following parameters except ___________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
MTTR is the time that it takes for the service provider to repair the fault. Often this is defined in minutes.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
When a new server is added to the server group, the load balancer automatically starts to send requests to it.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It is a comprehensive strategy that helps business processes to restart or proceed despite a security incident.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The terms protection of information, cyber protection, and information assurance are also used interchangeably.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It can provide a collection of specifications and procedures that are not only documentable but also repeatable.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Security analysts typically include the use of Hashing Algorithms such as MD5 and SHA1 to verify data integrity.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Security architecturecalls for its own unique set of skills and competencies of the enterprise andIT architects.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
is a requirement whose purpose is to keep sensitive information from being disclosed to unauthorized recipients.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A ____________________ must recognize the assets of an organization as well as all possible risks to those assets
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Physical security consist in the closure of IT equipment in a dedicated spaceand the provision of access control.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Safety managers assess the capabilities and limitations of their IT and information infrastructure organizations.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1