IT-6205A - Information Assurance and Security oed answer key

Showing 261 to 280 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A residence would have a single wired Internet connection attached to a modem in a very traditional configuration.

Answer

True

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Safety engineers assess the capabilities and limitations of their IT and information infrastructure organizations.

Answer

False

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The definition andenforcement of permitted capabilities for a person or entity whose identity hasbeen established.

Answer

Authentication

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The method of scanning an environment for weak points and prioritizing remediation based on risk is _____________.

Answer

vulnerability management

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

This kind of network enables you to cover an area from few miles to tens of miles, depending on the kind of setup.

Answer

MAN

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

When the company writes and develops the overall security strategies and mechanisms, the CIA triad can direct you.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The framework within which an organization strives to meet its needs for information security is codified as _____

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security management experts must identify the key threat mechanisms in an organization so that they can be handled.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

These are constantly creating and implementing new securitytools to help enterprise users better secure their data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Who sets all the security controls against malicious actors, and how they apply to the overall device architecture?

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The principle dictates that information should solely be viewed by people with appropriate and correct privileges.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

____________________ these are unintentional in nature and are by far the most prevalent form of operating problems.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Is thestudy of how to protect your informationassets from destruction, degradation, manipulation and exploitation.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is a person who anticipates possible cyber-attacks and is quick to develop mechanisms and programs to avoid them.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Sent by the SNMP manager to the agent to obtain large tables of data by performing multiple GetNext Request commands.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Are applicable toensuring that security requirements are addressed in subsequent phases of theADM. What phase is that?

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Assess the impact of new security measures uponother new components or existing leveraged systems. What phase is that?

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Information can be used to distinguish an individual's identity from another or be used to deanonymize anonymous data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Threat assessments reflect the totality of the intelligence collection effort targeting the organization inaccurately.

Page 14 of 21