IT-6205A - Information Assurance and Security oed answer key

Showing 61 to 80 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Knowledge acquired through experience or study.

Answer

Information

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security is characterized as _________________.

Answer

danger-free, damage-free

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_______ also can create their own custom probes.

Answer

Users

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Not performing an activitythat would incur risk.

Answer

Risk Avoidance

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Risk Management Procedure consists of six steps.

Answer

· Make risk management decisions · Prioritize countermeasure options · Assess risks · Assess vulnerabilities · Assess threats

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

You can cascade hubs to create network blockage.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The organization'sattitude and tolerance for risk.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Transmitting the weapon to the target environment.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Identify the Untrusted Zone in VPN Connection Zone

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is the most frequent type of operational issues.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or False: Written and publishedsecurity policy

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Which one is not a security threat in the IT world?

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

__________:controlling who gets to read information

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

A switch, running on the data link layer, is called:

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The amount of packet loss-related SLAs generally is:

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Knowledge and understanding in human decision space.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Redirect data packet requests to an alternative path.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

True or False: Data classificationpolicy documentation

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Data and data processing activities in physical space.

Page 4 of 21