IT-6205A - Information Assurance and Security oed answer key

Showing 401 to 413 of 413 total answers.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on

Answer

circumstances

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

If security teams have to go back and reset the entire system to meet new parameters, _________________ occur, which can undermine the safety of the infrastructure.

Answer

Disconnect

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Infecting a victim system with a computer trojan, backdoor or other malware application of this type that ensures the attacker’s presence in the target environment;

Answer

Installation

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

If the extent of vulnerability is assessed to be high, and the adversary threat is apparent, adverse manipulation is expected, and the threats are assessed to be high.

Answer

True

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

For a ________ , the chief concern may be ensuring the confidentiality of classified information, whereas a funds transfer system may require strong integrity controls

Answer

national defense system

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A _________________ is a collection of interconnected computers that helps the computer to communicate and share its power, data, and applications with another computer.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation. But also, how to recover should any of those happen.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Defense - in - depth barrier is only effective when the legislation on individuals, instruments, and knowledge assurance is present at any level of a company's structure.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

A major conclusion of this report is that the lack of a clear_____of security policy for general computing is a major impediment to improved security in computer systems.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

For example, a firewall law can cause packets containing port numbers higher than 1023 to be dropped since most servers respond to regular ports ranging from zero to 1023.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The smallest and most common type of network, consisting of a wireless modem, a computer or two, computers, printers, tablets, etc. In one building, it circles one person.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A limited number of missing devices will be retrieved by a large transport company, not to speak of devices misplaced in buses, airplanes, trams, rideshare cars, and so on.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The following securityspecifics appropriate to the security architecture must be addressed withineach phase in addition to the generic phase activities. What phase is that?

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

The need for skilled workers and allocation of funds for security within their budget: Companies are making the effort to allocate more funds in their budgets for security.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_____________________ is also seen as the most critical aspect of a good information security policy as it is essentially the end-users that need to be able to use the data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Once this bidirectional communication has been made, an attacker has access inside the target environment and can usually control the activity by manually launching commands;

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The ability to addand change security policies, add or change how policies are implemented in theenterprise, and add or change the persons or entities related to the systems.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Both individuals need to know what data is most critical to the organization so they can focus on placing the right ____________________ and monitoring controls on that data.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

___________________ means securing the computing network of the company and protecting external computers that are connected to it, such as notebooks, smartphones and tablets.

Page 21 of 21