AccurateWarbler just signed up and they study Marketing Management 📈
JointParrotfish downvoted the question #2818
StripedAntlion just signed up and they study Psychology 🧸
LightCat downvoted the question #1324
AshamedGazelle downvoted the question #18165
AshamedGazelle downvoted the question #18165
AshamedGazelle downvoted the question #18180
AshamedGazelle downvoted the question #18180
MoralRabbit upvoted the question #3863
MoralRabbit just signed up and they study Hotel Management 🏨
AMA University Answers
Information Assurance and Security 1
Showing 1-75 of 443 answers
_______ also can create their own custom probes.
__________ use packet switching to receive, process and forward data.
___________ is based on a comprehensive review of the specifications.
_____________ in terms of protection of the law or contractually protected or valuable information.
______________ is closely connected to risk management, which seeks to offer a permanent and safe approach to these conditions by different processes, protocols, rules, and requirements, which can serve to avoid or mitigate perceived risks in particular.
______________ requires assurance that all systems of information are secure and not abused.
_______________ are a sequence of attacks that have been strung together.
_______________ should also consider any regulations that impact the way the company collects,stores, and secures data, such as PCI-DSS, HIPAA, SOX, FISMA.
Cyber Risk Assessment
________________ are intended to find exploitable flaws in a company's data network.
Phishing and Identity Theft
________________ is a network layer protocol that is used by network devices to diagnose network connectivity problems.
________________ is the process of protecting individual pieces of data that could be grouped to give the bigger picture.
__________________ is measured on the basis of the likelihood of leakage of sensitive information and the effect if such leakage happens.
__________________ use wireless network infrastructure, such as Wi-Fi.
___________________ is a mechanism that detects friendly activities that, if correctly evaluated and grouped alongside other data to expose vital information or confidential data, may be helpful to a possible intruder.
___________________ means securing the computing network of the company and protecting external computers that are connected to it, such as notebooks, smartphones and tablets.
___________________ refers to the defense of physical threats against infrastructure.
____________________ identifies and implements a set of procedures, guidelines, methodologies, programs, and frameworks with regard to individuals, systems, technologies, information, and supporting resources to preserve mission integrity.
____________________ these are unintentional in nature and are by far the most prevalent form of operating problems.
_____________________ divert all traffic or workload to a backup device in this scenario.
_____________________ hackers edit the HTML of a website for fun or ideological purposes to vandalize it.
_____________________ is also a theory of information assurance that mandates that he will experience some degree of protection that makes the data he needs unavailable regardless of where an opponent can stage his attack.
_____________________ is also seen as the most critical aspect of a good information security policy as it is essentially the end-users that need to be able to use the data.
_____________________ may be called a specification that involves a structure and discusses the relation between the components of that structure.
______________________ helps ensure that only approved people can view and make improvements to confidential information that remains there as you reach the internal company network.
______________________ is for corporate networks and IT divisions of business.
IT network security
IT network assurance
IT network credibility
IT network intelligence
______________________ monitors the effect of network transition on protection, availability, and enforcement as a supplement to IT application-level security and data-level security solutions and a subset of network management.
______________________ refers to shielding software, hardware and data from physical attacks, or stopping operating services from doing so.
_________________________ is a data that may be used to classify a single individual.
Personally identifiable information
General Data Protection Regulation
Context of issue
Health Insurance Portability and Accountability Act
_________________________ is about not making information accessible to unauthorized persons, organizations or systems or exposed to them.
_________________________ is one of the most valuable intangible assets of any company, and it is the duty of management to properly secure it, as all assets.
______________________________ best practices and knowledge on techniques of social engineering can be additional facets of preparation to deter users from bending data-handling laws with good intentions and potentially devastating consequences.
Strong integrity and integrity-related
Strong data and data related
Strong passwords and password-related
Strong system and system-related
______________________________ of consumer and business information are the most important considerations.
Exquisite and exclusivity
Political and mandate
Network and policy
Security and privacy
_______________deployed by using USB.
World Area Network
Wired Personal Area Network
Wireless Personal Area Network
Personal Area Network
__________is closely correlated with the control of risk.
(IA) is the study of how to protect your information assets from destruction,degradation, manipulation and exploitation.
A ________________ is defined as information being used by someone who should not have seen it.
lack of privacy
lack of conclusion
lack of validation
lack of permission
A _________________ is a collection of interconnected computers that helps the computer to communicate and share its power, data, and applications with another computer.
A ____________________ must recognize the assets of an organization as well as all possible risks to those assets
A ______________________ is the classical example of a lack of availability to a hostile attacker.
A company that aims to establish a functioning information management program needs to have well-defined security and strategy goals
Authorization and Access Control Policy
Information Security Objective
A crucial point to consider regarding the CIA Triad is that it may suggest the tradeoff with others to prioritize one or more concepts.
A cryptographic protocol usually incorporates at least some of these aspects except.
Secret Sharing Method
Key Agreement or establishment
Secure multi-party computations
A domain name is an easy way to remember an address, but it has to be translated to its digital IP format.
A full inventory ofarchitecture elements that implement security services must be compiled inpreparation for a gap analysis. What phase is that?
Phase C: Information System Architecture
A gateway is sometimes called a network.
A limited number of missing devices will be retrieved by a large transport company, not to speak of devices misplaced in buses, airplanes, trams, rideshare cars, and so on.
A main and basic type of network protection firewall is a stateful packet-filtering firewall.
A network assurance technology called the _______________________ was launched by Cisco in January 2018.
Network Assurance Engine
Network Assurance Engineer
Network Instant Engine
Network Insurance Engineer
A network topology describes the physical composition of a software.
A paradigm meant to direct information security practices within an enterprise.
A request to retrieve the value of a variable or list of variables.
A residence would have a single wired Internet connection attached to a modem in a very traditional configuration.
A router port that links to the Internet needs to learn how to route contact messages to destinations across the globe effectively.
A simplified and more popular instance of an assault on data integrity will be a _____________.
A switch, running on the data link layer, is called:
Layer 2 device
A typical way of maintaining secrecy is _________________.
A________________ basis is also used as a rule of thumb for access and exchange of knowledge in the military and other government agencies.
Acceptance, avoidance, mitigation, transfer—are with respect to a specific risk for a specific pary.
The risk treatment
Acceptance,avoidance, mitigation, transfer—are withrespect to a specific risk for a specific pary.
The risk treatment
Accepted facts,principles, or rules of thumb that are useful for specific domains.
According to Digital Guardian, information assurance and information security is:
the words knowledge, assurance, and protection to understand the popular understanding of the terms and to prevent further confusion
The words are fundamentally related and share an ultimate objective of protecting the integrity of the information
none of the choices
Knowledge is advanced by definition To be counted as useful knowledge, it should be: precise, timely, complete, verifiable, consistent, available
According to many other cybersecurity experts, the CIA model is unlimited, and certain elements are not adequately shielded.
According to the National Security Agency, the maximum degree in information security would be ____________________________ along with technologies and clear organization procedural standards at all layers of the business model.
achievable when bringing personnel skilled in information assurance
none of the choices
stronger systems to produce passwords and usernames, improved intrusion prevention machines, and ironclad proxy servers
be introduced and consistently used to ensure customer protection, minimize identity theft, and eliminate the Internet fraud that plagues e-commerce today
According to the National Security Agency, the maximum degree in information security would be achievable when bringing __________________.
personnel skilled in information assurance along with technologies and clear organization procedural standards at all layers of the business model
personnel skilled in information assurance along with security and information of organization procedural standards at all layers of the business model
personnel skilled in information assurance along with data and collection of organization procedural standards at all layers of the business model
personnel skilled in information assurance along with incorporators and stockholders of organization procedural standards at all layers of the business model
According to the SANS Institute, information security refers to the procedures and methodologies planned and applied to deter unauthorized entry, use, abuse, dissemination, degradation, alteration or interruption of paper, electronic or some other form of classified, private and sensitive information or data.
Acronym for TCB?
Trusted Computing Base
Actions taken thatprotect and defend information and information systems by ensuring their availability, integrity, authentication, confidentialityand
After completing a pen test, the testers report their results to the company's security manager so that solutions and patches can be created.
After the first six phases, an attacker can act to achieve the goals. These actions typically consist of collecting information, modifying data integrity, or attacking the availability of services and devices, but the victim system can also be used as a starting point for infecting other systems or for expanding access to the local network.
Action on Objective
After the weapon is delivered to the victim, follows the targeting of an application or vulnerability of the operating system. The infected file can be used by the self-execution facility to launch the malware code, or it can be executed by the user himself;
After the weapon is delivered to the victim, follows the targetingof an application or vulnerability of the operating system. The infected filecan be used by the self-execution facility to launch the malware code, or itcan be executed by the user himself;
All vulnerabilities are in web services.
Although proxy firewalls secure clients in general, servers are secured by _____________.
Stateful Packet Filtering Firewall
Packet Filtering Firewall
An IP address is a human-friendly website URL.
Another provider that claims to have network assurance capabilities through continuous network verification in its platform is ____________________________.
Unique flow System
Need to search and CTRL+F on AMA modules?
Cost Accounting and Control -
Intermediate Accounting 3 -
Macroeconomics Theory and Practice -
Biological Science -
Introduction to Communication Media -
Current Trends and Issues -
Introduction to HDL -
2D/3D Digital Animation -
Algorithms and Complexity -
Animation Project -
Application Life Cycle Management -
Automata Theory and Formal Language -
Discrete Mathematics -
Discrete Structures 2 -
Load Testing -
Object Oriented Programming -
Principles of Operating Systems and its Applications -
Software Engineering 1 -
Software Engineering 2 -
Statistical Analysis with Software Application -
Unified Functional Testing -
Electronics 1: Electronic Devices and Circuits -
Fundamentals of Mixed Signals and Sensors -
Computer Aided Drawing -
Engineering Economincs -
Philippine Literature -
Purposive Communication 2 -
Euthenics 1 -
Euthenics 2 -
Kritikal na Pagbasa, Pagsulat at Pagsasalita -
Pagsasaling Pampanitikan -
Art Appreciation -
Environmental Science -
Life and Works of Jose Rizal -
Living in the IT Era -
Mathematics in the Modern World -
Philippine Popular Culture -
Purposive Communication 1 -
Readings in Philippine History -
Science, Technology, and Society -
The Contemporary World -
Understanding the Self -
General Mathematics -
Accounting Information System -
Advanced Database Management Systems -
Audio and Video Production -
Cisco - Introduction to Packet Tracer -
Data Communications and Networking 1 -
Data Communications and Networking 2 -
Data Communications and Networking 3 -
Data Communications and Networking 4 -
Database Management System 1 (Oracle) -
Database Management System 2 (Oracle 10g Admin) -
Information Assurance and Security 1 -
Information Assurance and Security 2 -
Integrative Programming and Technology 1 -
Introduction to Human Computer Interaction -
Introduction to Multimedia -
IT Capstone Project 1 -
Network Security -
Quantitative Methods -
System Administration and Maintenance -
System Integration and Architecture 1 -
Web Application Development 1 -
Web Systems Technologies -
Application Development and Emerging Technology -
Cloud Computing and the Internet of Things -
Computer Programming 1 -
Computer Programming 2 -
Data Structures and Algorithm Analysis -
Fundamentals of Database System -
Information Management -
Introduction to Computing -
Social and Professional Issues -
Calculus 1 -
Data Analysis -
Number Theory -
Numerical Methods -
Strategic Management -
Calculus-Based Physics 1 -
Calculus-Based Physics 2 -
National Service Training Program 1 -
National Service Training Program 2 -
Web Design -
Individual/Dual Sports -
Physical Fitness -
Rhythmic Activities -
Team Sports -
Abnormal Psychology -
Developmental Psychology -
Introduction to Psychology -
Physiological Psychology -
Accounting Research Methods -
Inquiries, Investigations and Immersion -
Practical Research 1 -
Income Taxation -