Your browser does not support JavaScript!
InnovativePiranha just signed up and they study Computer Science đŸ’»
CommunistHornet just signed up and they study Computer Science đŸ’»
LtdPerch just signed up and they study Hotel Management 🏹
MildHedgehog just signed up and they study Marketing Management 📈

Information Assurance and Security 1

Showing 1-75 of 443 answers

_______ also can create their own custom probes.
  • Admins
  • Users Correct
  • Agents
  • Managers
___________ is based on a comprehensive review of the specifications.
  • Regulation assurance Correct
  • Retired assurance
  • Rendered assurance
  • Restrict assurance
_____________ in terms of protection of the law or contractually protected or valuable information. 
  • Information system
  • Information security Correct
  • Information management
  • Information assurance
________________ are intended to find exploitable flaws in a company's data network.
  • Phishing and Identity Theft
  • Vulnerability Management
  • Endpoint Security
  • Penetration Test Correct
___________________ refers to the defense of physical threats against infrastructure. 
  • Operational security
  • Personnel security
  • IT security
  • Physical security Correct
____________________ these are unintentional in nature and are by far the most prevalent form of operating problems.
  • Sabotage misconfigurations
  • Deliberate misconfigurations
  • Accidental misconfigurations Correct
  • Intentional misconfigurations
_____________________ divert all traffic or workload to a backup device in this scenario.
  • Security advancement
  • Security analysts Correct
  • Security intelligence
  • Security intercom
_____________________ hackers edit the HTML of a website for fun or ideological purposes to vandalize it.
  • defacement assault Correct
  • physical assault
  • juvenile assault
  • conjugal assault
______________________ is for corporate networks and IT divisions of business.
  • IT network security
  • IT network assurance Correct
  • IT network credibility
  • IT network intelligence
_________________________ is a data that may be used to classify a single individual.
  • Personally identifiable information Correct
  • General Data Protection Regulation
  • Context of issue
  • Health Insurance Portability and Accountability Act
______________________________ of consumer and business information are the most important considerations.
  • Exquisite and exclusivity
  • Political and mandate
  • Network and policy
  • Security and privacy Correct
_______________deployed by using USB. 
  • World Area Network
  • Wired Personal Area Network Correct
  • Wireless Personal Area Network
  • Personal Area Network
__________is closely correlated with the control of risk.
  • Information Security
  • Information Alliance
  • Information Intelligence
  • Information Assurance Correct
A ________________ is defined as information being used by someone who should not have seen it.
  • lack of privacy Correct
  • lack of conclusion
  • lack of validation
  • lack of permission
A ____________________ must recognize the assets of an organization as well as all possible risks to those assets
  • security evidence
  • security technique
  • security strategy Correct
  • security insurance
A ______________________ is the classical example of a lack of availability to a hostile attacker.
  • denial-of-service attack Correct
  • marriott attack
  • details-of-operation attack
  • parker manipulation
A company that aims to establish a functioning information management program needs to have well-defined security and strategy goals
  • Authorization and Access Control Policy
  • Scope
  • Purpose
  • Information Security Objective Correct
A cryptographic protocol usually incorporates at least some of these aspects except.
  • Secret Sharing Method
  • Key Agreement or establishment
  • Security authentication Correct
  • Secure multi-party computations
A network assurance technology called the _______________________ was launched by Cisco in January 2018.
  • Network Assurance Engine Correct
  • Network Assurance Engineer
  • Network Instant Engine
  • Network Insurance Engineer
A request to retrieve the value of a variable or list of variables.
  • GetBulk Request
  • Set Request
  • Get Request Correct
  • GetNext Request
A simplified and more popular instance of an assault on data integrity will be a _____________.
  • defacement assault Correct
  • juvenile assault
  • physical assault
  • conjugal assault
A switch, running on the data link layer, is called:
  • 3 switches
  • joystick
  • Layer 2 device Correct
  • Ethernet hub
A typical way of maintaining secrecy is _________________.
  • data encryption Correct
  • data description
  • data inclusion
  • data exclusivity
According to Digital Guardian, information assurance and information security is:
  • the words knowledge, assurance, and protection to understand the popular understanding of the terms and to prevent further confusion
  • The words are fundamentally related and share an ultimate objective of protecting the integrity of the information Correct
  • none of the choices
  • Knowledge is advanced by definition To be counted as useful knowledge, it should be: precise, timely, complete, verifiable, consistent, available
According to the National Security Agency, the maximum degree in information security would be ____________________________ along with technologies and clear organization procedural standards at all layers of the business model.
  • achievable when bringing personnel skilled in information assurance Correct
  • none of the choices
  • stronger systems to produce passwords and usernames, improved intrusion prevention machines, and ironclad proxy servers
  • be introduced and consistently used to ensure customer protection, minimize identity theft, and eliminate the Internet fraud that plagues e-commerce today
According to the National Security Agency, the maximum degree in information security would be achievable when bringing __________________.
  • personnel skilled in information assurance along with technologies and clear organization procedural standards at all layers of the business model Correct
  • personnel skilled in information assurance along with security and information of organization procedural standards at all layers of the business model
  • personnel skilled in information assurance along with data and collection of organization procedural standards at all layers of the business model
  • personnel skilled in information assurance along with incorporators and stockholders of organization procedural standards at all layers of the business model
Acronym for TCB?
  • Trusted Computing Base Correct
Although proxy firewalls secure clients in general, servers are secured by _____________.
  • Proxy Firewall
  • Stateful Packet Filtering Firewall
  • Packet Filtering Firewall
  • WAF Correct
Search
All courses