IT-6205A - Information Assurance and Security oed answer key

Showing 381 to 400 of 413 total answers.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Keeping information___________________ electronic computers (such as ancient cryptography) to this very day falls under the banner of information security.

Answer

secure for the history of data predating

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

One can implement that policy by taking specific actions guided by management control principles and utilizing specific security standards, procedures, and

Answer

mechanisms

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Another provider that claims to have network assurance capabilities through continuous network verification in its platform is ____________________________.

Answer

Veriflow Systems

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is where the intruder sends a ping greater than the actual acceptable size of the packet to the target computer, forcing the computer to freeze or crash.

Answer

Ping of Death Attack

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Tests and measurements", "aggressive monitoring", "network efficiency monitoring" or simply "network assurance" are also referred to as ___________________.

Answer

service assurance tools

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Establish architecture artifact, design, andcode reviews and define acceptance criteria for the successful implementationof the findings. What phase is that?

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Over the last decade, we’ve seen a _________________ between cybersecurity and information security, as these previously siloed positions have come together.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_________________________ is one of the most valuable intangible assets of any company, and it is the duty of management to properly secure it, as all assets.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

During decision making on the acquisition of cybersecurity resources, these policies inform an organization. It also mandates the actions and duties of staff.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The word __________________ was invented by the United States Army during the Vietnam War as a part of military operations led by a team called Purple Dragon.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or False: Identify softenterprise (units) - those who will see change to their capability and workwith core units but are otherwise not directly affected

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

is all about protecting data that is found in electronic form (such as computers, servers, networks, mobile devices, etc.) from being compromised or attacked.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

IT protection departments should follow an emergency response strategy before or after an accident as a _________________ to maintain control of the situation.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Is a measure ofconfidence that the security features, practices, procedures, and architecture of a system accurately mediates and enforces the security policy.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or False: Identify communitiesinvolved (enterprises) - those stakeholders who will be affected by securitycapabilities and who are in groups of communities

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Information security is_____________________, and effective trained persons are essential for this reason in order to efficiently supervise the security systems.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The end-user device is typically called the local host and communicates to the remote host over the Internet, and is the second computer running the FTP program.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Тhe concept of layers illustrates that data communications and are designated to function in a layered manner, transferring the data from one layer to the next.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Physical attack anddestruction, including: electromagneticattack, visual spying, intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.

Page 20 of 21