IT-6205A - Information Assurance and Security oed answer key
Showing 361 to 380 of 413 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_____________________ may be called a specification that involves a structure and discusses the relation between the components of that structure.
Answer
System architecture
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ___________ is something that the remote user discovers because he does not know the name of the server with whom he is currently interacting.
Answer
Proxy
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
This involves enforcing security measures to ensure that data cannot be changed or destroyed by, or in an undetected way by, an unauthorized user.
Answer
data integrity
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Network ____________________ verify the best practices and skills needed by administrators of network security to execute their duties effectively.
Answer
security certificates
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
IT protection removes __________________ attacks and future __________________ of protection that can have a significant effect on the organization.
Answer
malicious; violations
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The focus of physical security is on the planning, _________________, and protection of countermeasures that can secure a company's physical capital.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Review the existing defenses to assess whether, if any, vulnerabilities or flaws exist that can be used to obtain access to your personal information.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Actions taken thatprotect and defend information and information systems by ensuring their availability, integrity, authentication, confidentialityand
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Definition ofrelevant stakeholders and discovery of their concerns and objectives willrequire development of a high-level scenario. What phase is that?
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Every system willrely upon resources that may be depleted in cases that may or may not beanticipated at the point of system design. What phase is that?
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
This is an assurance that the systems responsible fordelivering, storing, and processing information are accessible when needed, bythose who need them.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
True or FalseTo align these components effectively, the security architecture need to be driven by policy stating management’s performance expectation.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
This keeps the potential enemies from discovering critical DOD information, such as when units are mobilizing, traveling, or what processes are involved.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Ensuring proper HTTPS implementation for an ecommerce website or mobile app falls under cybersecurity and computer security, so it’s ___________________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Availability is defined as the percentage of time during which a service can use for the purpose that it was originally designed and built for __________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
The Layer describes the notion that access to infrastructure components has to be constrained to business ought-to-know. For instance, access to servers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_______________ should also consider any regulations that impact the way the company collects,stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1