IT-6205A - Information Assurance and Security oed answer key

Showing 121 to 140 of 413 total answers.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security architecturecomposes its own discrete views and viewpoints.

Answer

TRUE

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The more software an organization deploys, the more bugs it creates.

Answer

True

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

There are ________ types of firewall policies which are widely used.

Answer

2

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

assurance that information is not disclosed to unauthorized persons.

Answer

Confidentiality

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

__________ use packet switching to receive, process and forward data.

Answer

Switch

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

___________ is based on a comprehensive review of the specifications.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Notice that integrity goes hand and hand with the___________________.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

While you are walking, keep your mind on what is going on around you.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

__________________ use wireless network infrastructure, such as Wi-Fi.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

In FTP, we need to complete all the operations to get the entire file.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The Control Connection uses very complex rules as data types may vary.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Regulation assurance is based on a simple review of the specifications.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

It is the use and set of hardware and software, including special tools.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

privacy, integrity can be directly violated by an attack vector such as:

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Those who are mostaffected and achieve most value from the security work

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

_______________ are a sequence of attacks that have been strung together.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

The accuracy of the data structures and the existence of the stored data.

#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2

Layer describes the notion that data ought to be secured while in motion.

#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1

Security services and processes are implemented, operated, and controlled.

Page 7 of 21

1...56789...21