IT-6205A - Information Assurance and Security oed answer key

Showing 341 to 360 of 413 total answers.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

With __________ attacks, for example, even legitimate and honest users of an owner mechanism can be tricked into disclosing secret data.

Answer

Trojan horse

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

__________________ is measured on the basis of the likelihood of leakage of sensitive information and the effect if such leakage happens.

Answer

Danger

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The ability to testand prove that the enterprise architecture has the security attributes requiredto uphold the stated security policies.

Answer

Assurance

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Computer security and cybersecurity are completely ___________________, and require digital computer technology from 1946’s ENIAC to now.

Answer

interchangeable terms

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_________________________ is about not making information accessible to unauthorized persons, organizations or systems or exposed to them.

Answer

Confidentiality

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The main ways of transport are e-mails (attachment of infected files), web platforms (running malware scripts), or removable USB memories;

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or FalseSecurity policies and procedures also should help the organization implement the elements needed to support the architecture.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

______________________ refers to shielding software, hardware and data from physical attacks, or stopping operating services from doing so.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A________________ basis is also used as a rule of thumb for access and exchange of knowledge in the military and other government agencies.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

According to the National Security Agency, the maximum degree in information security would be achievable when bringing __________________.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Is it true or false. Encrypting all personal information when saved on different storage media is some basic steps in storing personal data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It concerns the physical security of facilities, persons, and goods and the safety of information, networks, and telecommunications systems.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The security architect needs to draft knowledge of the organization's infrastructure to learn who has access to where weak points can occur.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Within an effective information security unit, several different main functions are necessary for the CIA Triad to be effectively delivered.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

After completing a pen test, the testers report their results to the company's security manager so that solutions and patches can be created.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It originated as a military term that described strategies to prevent potential adversaries from discovering critical operations-related data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A full inventory ofarchitecture elements that implement security services must be compiled inpreparation for a gap analysis. What phase is that?

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Following a cyber riskassessment, develop and implement a plan to mitigate cyber risk and protect the“_____________” outlined in the assessment.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

These network forms are developed and operated by organizations who want to link their separate locations and connect computing resources safely.

Page 18 of 21