IT-6205A - Information Assurance and Security oed answer key
Showing 301 to 320 of 413 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Stateful packet filtering firewalls cannot completely access higher-layer protocols and application services for inspection.
Answer
True
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Any SNMP managers can automatically send an email or text message warning to the administrator if the threshold is surpassed.
Answer
True
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Critical information is limited to military deployment schedules, internal organizational information, security measures, etc.
Answer
False
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Defense against arson, flooding, natural disasters, fraud, burglary, vandalism, and extremism are included as _______________.
Answer
physical security
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It evaluates the business influence of vital business assets and the odds and effects of vulnerabilities and security threats.
Answer
Architecture Risk Assessment
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The state of beingprotected against the criminal or unauthorized use of electronic data, or themeasures taken to achieve this.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
consists of changing the data located in files into unreadable bits of characters unless a key to decode the file is provided.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Is a generic termthat implies a mechanism in place to provide a basis for confidence in the reliability/security of the system.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
To access the FTP server, we do not need to log in with the username and password. Therefore, we can say that FTP is vulnerable.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Establishing a security benchmark helps companies state that they do not have a managed atmosphere and have sound risk management.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The infected file can be used by the self-execution facility tolaunch the malware code, or it can be executed by the user himself;
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Computers are ______ entities, and programs can be changed in a twinkling, so that past happiness is no predictor of future bliss.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A router port that links to the Internet needs to learn how to route contact messages to destinations across the globe effectively.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Availability: Availability of information refers to ensuring that authorized parties are able to access the information when needed
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Computer networking devices that allow one or more computers to be linked to other computers, networked devices, or other networks:
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
According to ______taxonomy of information security, a computing environment is made up of five continuously interacting components
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
A principle which is a core requirement of information security for the safe utilization, flow, and storage of information is the .
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A company that aims to establish a functioning information management program needs to have well-defined security and strategy goals
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1