IT-6205A - Information Assurance and Security oed answer key
Showing 401 to 413 of 413 total answers.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on
Answer
circumstances
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
If security teams have to go back and reset the entire system to meet new parameters, _________________ occur, which can undermine the safety of the infrastructure.
Answer
Disconnect
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Infecting a victim system with a computer trojan, backdoor or other malware application of this type that ensures the attacker’s presence in the target environment;
Answer
Installation
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
If the extent of vulnerability is assessed to be high, and the adversary threat is apparent, adverse manipulation is expected, and the threats are assessed to be high.
Answer
True
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
For a ________ , the chief concern may be ensuring the confidentiality of classified information, whereas a funds transfer system may require strong integrity controls
Answer
national defense system
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A _________________ is a collection of interconnected computers that helps the computer to communicate and share its power, data, and applications with another computer.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation. But also, how to recover should any of those happen.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Defense - in - depth barrier is only effective when the legislation on individuals, instruments, and knowledge assurance is present at any level of a company's structure.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
A major conclusion of this report is that the lack of a clear_____of security policy for general computing is a major impediment to improved security in computer systems.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
For example, a firewall law can cause packets containing port numbers higher than 1023 to be dropped since most servers respond to regular ports ranging from zero to 1023.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The smallest and most common type of network, consisting of a wireless modem, a computer or two, computers, printers, tablets, etc. In one building, it circles one person.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
A limited number of missing devices will be retrieved by a large transport company, not to speak of devices misplaced in buses, airplanes, trams, rideshare cars, and so on.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The following securityspecifics appropriate to the security architecture must be addressed withineach phase in addition to the generic phase activities. What phase is that?
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
The need for skilled workers and allocation of funds for security within their budget: Companies are making the effort to allocate more funds in their budgets for security.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
_____________________ is also seen as the most critical aspect of a good information security policy as it is essentially the end-users that need to be able to use the data.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Once this bidirectional communication has been made, an attacker has access inside the target environment and can usually control the activity by manually launching commands;
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
The ability to addand change security policies, add or change how policies are implemented in theenterprise, and add or change the persons or entities related to the systems.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2
Both individuals need to know what data is most critical to the organization so they can focus on placing the right ____________________ and monitoring controls on that data.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1