IT-6205A - Information Assurance and Security oed answer key

Showing 281 to 300 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

________________ is a network layer protocol that is used by network devices to diagnose network connectivity problems.

Answer

ICMP

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is a support protocol used by network devices such as routers to transmit error messages and operations information.

Answer

ICMP

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Once technology architects discover flaws in current networks, they create a new design to improve security frameworks.

Answer

False

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Proxy servers act as a firewall and web filter to speed up common requests, have shared network access, and cache data.

Answer

True

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The ability of theenterprise to function without service interruption or depletion despiteabnormal or malicious events.

Answer

Availability

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

To affect thetechnical performance and the capabilityof physical systems, to disrupt the capabilitiesof the defender.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

When a cyber breach happens, information security experts are interested in mitigating the breach's detrimental effects.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

________________ is the process of protecting individual pieces of data that could be grouped to give the bigger picture.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The ability toprovide forensic data attesting that the systems have been used in accordancewith stated security policies.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The engineering method of formal verification, which explicitly correlates with concept checking, requires network cables

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

According to _______ IA has four major categories: physical security personnel security IT security operational security.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

(IA) is the study of how to protect your information assets from destruction,degradation, manipulation and exploitation.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Service Availability is the percentage of time during which a service can be used to be designed and built for originally.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The protection ofinformation assets from loss or unintended disclosure, and resources fromunauthorized and unintended use.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Those units outsidethe scoped enterprise who will need to enhance their security architecture forinteroperability purposes

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or False: Identify coreenterprise (units) - those who are most affected and achieve most value fromthe security work

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Early disclosure may jeopardize______ advantage, but disclosure just before the intended announcement may be insignificant.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The_____must be managed by auditing, backup, and recovery procedures supported by general alertness and creative responses.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

According to many other cybersecurity experts, the CIA model is unlimited, and certain elements are not adequately shielded.

Page 15 of 21