IT-6205A - Information Assurance and Security oed answer key

Showing 361 to 380 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_____________________ may be called a specification that involves a structure and discusses the relation between the components of that structure.

Answer

System architecture

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The ___________ is something that the remote user discovers because he does not know the name of the server with whom he is currently interacting.

Answer

Proxy

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

This involves enforcing security measures to ensure that data cannot be changed or destroyed by, or in an undetected way by, an unauthorized user.

Answer

data integrity

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Network ____________________ verify the best practices and skills needed by administrators of network security to execute their duties effectively.

Answer

security certificates

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

IT protection removes __________________ attacks and future __________________ of protection that can have a significant effect on the organization.

Answer

malicious; violations

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The focus of physical security is on the planning, _________________, and protection of countermeasures that can secure a company's physical capital.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Review the existing defenses to assess whether, if any, vulnerabilities or flaws exist that can be used to obtain access to your personal information.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Actions taken thatprotect and defend information and information systems by ensuring their availability, integrity, authentication, confidentialityand

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Definition ofrelevant stakeholders and discovery of their concerns and objectives willrequire development of a high-level scenario. What phase is that?

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Every system willrely upon resources that may be depleted in cases that may or may not beanticipated at the point of system design. What phase is that?

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

This is an assurance that the systems responsible fordelivering, storing, and processing information are accessible when needed, bythose who need them.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or FalseTo align these components effectively, the security architecture need to be driven by policy stating management’s performance expectation.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

This keeps the potential enemies from discovering critical DOD information, such as when units are mobilizing, traveling, or what processes are involved.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Ensuring proper HTTPS implementation for an ecommerce website or mobile app falls under cybersecurity and computer security, so it’s ___________________.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Availability is defined as the percentage of time during which a service can use for the purpose that it was originally designed and built for __________.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The Layer describes the notion that access to infrastructure components has to be constrained to business ought-to-know. For instance, access to servers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_______________ should also consider any regulations that impact the way the company collects,stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security management practitioners will vary from building guards to IT professionals who design high-tech network infrastructure and software applications.

Page 19 of 21