IT-6206 - Information Assurance and Security oed answer key
Showing 21 to 40 of 105 total answers.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Is a process, not anend state
Answer
Security
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Security systems should help:
Answer
detect, delay, respond
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
SNMPv2 is defined in _______.
Answer
RFC 1901
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
WAN network, data is _______.
Answer
centralized
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Controlling one's own actions.
Answer
Action Control
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
MAN stands for ______________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Network security architecture:
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Shift the risk tosomeone else.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
This is roughly equivalent to.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Type of Concept for Cybercrime
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
WAN stands for ______________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Seven Stages of lifecycle model
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Information and datamanipulation
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Is roughly equivalent to privacy
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Known as a procedural protection.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
PoE stands for _________________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
POLAN stands for ________________.
#IT-6205A
Awesome StudentQuestion • Information Assurance and Security 1
Authenticity must be _____________.
#IT-6206
Awesome StudentQuestion • Information Assurance and Security 2