IT-6205A - Information Assurance and Security oed answer key
Showing 341 to 360 of 413 total answers.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
With __________ attacks, for example, even legitimate and honest users of an owner mechanism can be tricked into disclosing secret data.
Answer
Trojan horse
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
__________________ is measured on the basis of the likelihood of leakage of sensitive information and the effect if such leakage happens.
Answer
Danger
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ability to testand prove that the enterprise architecture has the security attributes requiredto uphold the stated security policies.
Answer
Assurance
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Computer security and cybersecurity are completely ___________________, and require digital computer technology from 1946’s ENIAC to now.
Answer
interchangeable terms
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_________________________ is about not making information accessible to unauthorized persons, organizations or systems or exposed to them.
Answer
Confidentiality
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The main ways of transport are e-mails (attachment of infected files), web platforms (running malware scripts), or removable USB memories;
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
True or FalseSecurity policies and procedures also should help the organization implement the elements needed to support the architecture.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
______________________ refers to shielding software, hardware and data from physical attacks, or stopping operating services from doing so.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A________________ basis is also used as a rule of thumb for access and exchange of knowledge in the military and other government agencies.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
According to the National Security Agency, the maximum degree in information security would be achievable when bringing __________________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Is it true or false. Encrypting all personal information when saved on different storage media is some basic steps in storing personal data.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It concerns the physical security of facilities, persons, and goods and the safety of information, networks, and telecommunications systems.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The security architect needs to draft knowledge of the organization's infrastructure to learn who has access to where weak points can occur.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Within an effective information security unit, several different main functions are necessary for the CIA Triad to be effectively delivered.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
After completing a pen test, the testers report their results to the company's security manager so that solutions and patches can be created.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
It originated as a military term that described strategies to prevent potential adversaries from discovering critical operations-related data.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A full inventory ofarchitecture elements that implement security services must be compiled inpreparation for a gap analysis. What phase is that?
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Following a cyber riskassessment, develop and implement a plan to mitigate cyber risk and protect the“_____________” outlined in the assessment.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1