IT-6205A - Information Assurance and Security oed answer key
Showing 281 to 300 of 413 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
________________ is a network layer protocol that is used by network devices to diagnose network connectivity problems.
Answer
ICMP
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It is a support protocol used by network devices such as routers to transmit error messages and operations information.
Answer
ICMP
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Once technology architects discover flaws in current networks, they create a new design to improve security frameworks.
Answer
False
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Proxy servers act as a firewall and web filter to speed up common requests, have shared network access, and cache data.
Answer
True
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ability of theenterprise to function without service interruption or depletion despiteabnormal or malicious events.
Answer
Availability
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
To affect thetechnical performance and the capabilityof physical systems, to disrupt the capabilitiesof the defender.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
When a cyber breach happens, information security experts are interested in mitigating the breach's detrimental effects.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
________________ is the process of protecting individual pieces of data that could be grouped to give the bigger picture.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ability toprovide forensic data attesting that the systems have been used in accordancewith stated security policies.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The engineering method of formal verification, which explicitly correlates with concept checking, requires network cables
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
According to _______ IA has four major categories: physical security personnel security IT security operational security.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
(IA) is the study of how to protect your information assets from destruction,degradation, manipulation and exploitation.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Service Availability is the percentage of time during which a service can be used to be designed and built for originally.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The protection ofinformation assets from loss or unintended disclosure, and resources fromunauthorized and unintended use.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Those units outsidethe scoped enterprise who will need to enhance their security architecture forinteroperability purposes
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
True or False: Identify coreenterprise (units) - those who are most affected and achieve most value fromthe security work
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Early disclosure may jeopardize______ advantage, but disclosure just before the intended announcement may be insignificant.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
The_____must be managed by auditing, backup, and recovery procedures supported by general alertness and creative responses.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1