Your browser does not support JavaScript!

Information Assurance and Security 1

Showing 76-150 of 405 answers

Are applicable toensuring that security requirements are addressed in subsequent phases of theADM. What phase is that?
  • Phase A: Architecture Vision Correct
Are the securityfeatures of a system that  provideenforcement of a security policy.
  • Trust mechanism Correct
Assess and baseline current security-specificarchitecture elements. What phase is that?
  • Phase C: Information System Architecture Correct
Assess and baseline current security-specifictechnologies. What phase is that?
  • Phase D: Technology Architecture Correct
Assess the impact of new security measures uponother new components or existing leveraged systems. What phase is that?
  • Phase F: Migration Planning Correct
Assurance that the information is authentic and complete.
  • Availability Correct
Assurance the sender of data is provided with proof of delivery. The recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. 
  • Non-repudiation Correct
  • Non-redemption
  • Non-repidiation
  • Non-repetition
Assurancethat information is shared only among authorized persons or organizations.
  • Confidentiality Correct
Authenticity must be _____________.
  • accurate Correct
  • arranged
  • amable
  • active
Availability is defined as the percentage of time during which a service can use for the purpose that it was originally designed and built for __________.
  • Trust Availability
  • Service Availability Correct
  • Machine Availability
  • Personnel Availability
Availability such as data encryption and hashing is applied using authentication protocols.
  • True
  • False Correct
Availability: Availability of information refers to ensuring that authorized parties are able to access the information when needed
  • TRUE Correct
Availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
  • TRUE Correct
BGP means:
  • Balanced Gateway Protocol
  • Border Gateway Protocol Correct
  • Border Gateway Procedure
  • Balanced Gateway Procedure
BGP stands for _____________________________.
  • Broadcast Gigabytes Protocol
  • Built Guild Protocol
  • Border Gateway Protocol Correct
  • Bond Guide Protocol
Businesses are increasingly connecting software, customers, facilities, and so on to several networks
  • True Correct
  • False
Cable network interconnected by a transmitting medium such as cable, wire, etc.
  • True
  • False Correct
Changes in securityrequirements are often more disruptive than a simplification or incrementalchange. Changes in security policy can be driven by statute, regulation, orsomething that has gone wrong. What phase is that?
  • Phase H: Architecture Change Management Correct
Changes in securitystandards are usually less disruptive since the trade-off for their adoption isbased on the value of the change. However, standards changes can also bemandated. What phase is that?
  • Phase H: Architecture Change Mana Correct
Characterized by ______________________ cyberspace is more by the social connections involved than by its technological application.
  • Randall Farmer Correct
  • Rendell Farms
  • Gandalf Far
  • GRyffindor Farm
Compliance without the checklist by persons who lack a basic Information Assurance experience, though, is a simple recipe for trouble.
  • True
  • False Correct
Computer networking devices that allow one or more computers to be linked to other computers, networked devices, or other networks:
  • analog and unit
  • routers and cable
  • routers and switches Correct
  • switches and cord
Conceptof Cybercrime
  • TRUE Correct
Consists ofemployees, former employees and contractors.
  • Insiders Correct
Controlling one's own actions.
  • Access Control
  • Action Control Correct
  • Dual Control
  • Authorization
Converting datainto  information thus  requires knowledge
  • Information Correct
Corporate secretary managers recognize and eliminate possible corporate risks.
  • True
  • False Correct
Critical information is limited to military deployment schedules, internal organizational information, security measures, etc.
  • True
  • False Correct
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
  • TRUE Correct
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.
  • TRUE Correct
Cyber security, alsoreferred to as____________________, focuses on protectingcomputers, networks, programs and data from unintended or unauthorized access,change or destruction.
  • information technology security Correct
Cyberinfrastructure consists of structures, data and knowledge processing, advanced tools, visualization environments, and individuals connected by software and advanced networks to enhance academic competitiveness and enable.
  • True Correct
  • False
Cybersecurity is the collection of tools, policies,security concepts, security safeguards, guidelines, risk management approaches,actions, training, best practices, assurance and technologies that can be usedto protect the cyber environment and organization and user’s assets.
  • TRUE Correct
Cyberspace is "the environment in whichcommunication over computer networks occurs.“
  • TRUE Correct
Data and information assets must be confined to people who have authorized access and not disclosed to others
  • Confidentiality Correct
  • Integrity
  • Authenticity
  • Availability
Data is private if this can only be done for the individuals who are allowed to access it.
  • True Correct
  • False
Data should be maintained in a correct state, and nobody should be able to modify it, either accidentally or maliciously improperly:
  • Web security
  • Integrity Correct
  • IT assurance
  • Network system
Day-to-day processes, such as threat and vulnerability management and threat management.
  • Implementations
  • Security Architecture and Design
  • Operations and Monitoring Correct
  • Architecture Risk Assessment
DDoS means:
  • Distributed Divided of Surveillance
  • Distributed Distance of Surveillance
  • Distributed Denial of Service Correct
  • Distributed Desired of Service
Defense - in - depth barrier is only effective when the legislation on individuals, instruments, and knowledge assurance is present at any level of a company's structure.
  • True Correct
  • False
Defense against arson, flooding, natural disasters, fraud, burglary, vandalism, and extremism are included as _______________. 
  • IT security
  • Operational security
  • physical security Correct
  • personnel security
Definition ofrelevant stakeholders and discovery of their concerns and objectives willrequire development of a high-level scenario. What phase is that?
  • Phase A: Architecture Vision Correct
Determinewho are the legitimate actors who will interact with theproduct/service/process. What phase is that?
  • Phase B: Business Architecture Correct
Development of thebusiness scenarios and subsequent high-level use-cases of the project concernedwill bring to attention the people actors and system actors involved. What phase is that?
  • Phase B: Business Architecture Correct
During decision making on the acquisition of cybersecurity resources, these policies inform an organization. It also mandates the actions and duties of staff.
  • True Correct
  • False
Each __________ is equipped with a particular routing protocol associated with the purpose of that port.
  • router switch
  • router port Correct
  • router
  • router cable
Education will better familiarize authorized persons with risk factors and how to defend themselves from them.
  • True Correct
  • False
Establish architecture artifact, design, andcode reviews and define acceptance criteria for the successful implementationof the findings. What phase is that?
  • Phase G: Implementation Governance Correct
Establishing a security benchmark helps companies state that they do not have a managed atmosphere and have sound risk management.
  • True
  • False Correct
Every system willrely upon resources that may be depleted in cases that may or may not beanticipated at the point of system design. What phase is that?
  • Phase D: Technology Architecture Correct
Failure of themechanism may destroy the basis for trust.
  • Trust Correct
Following a cyber riskassessment, develop and implement a plan to mitigate cyber risk and protect the“_____________” outlined in the assessment.
  • crown jewels Correct
For example, a firewall law can cause packets containing port numbers higher than 1023 to be dropped since most servers respond to regular ports ranging from zero to 1023.
  • True Correct
  • False
Four Security Domain
  • Physical Security, Personnel Security, IT Security and Operational Security Correct
Four Security Domains
  • Physical Security, Personnel Security, IT Security, Operational Security Correct
From the BaselineSecurity Architecture and the Enterprise Continuum, there will be existingsecurity infrastructure and security building blocks that can be applied to therequirements derived from this architecture development engagement. What phase is that?
  • Phase E: Opportunities & Solutions Correct
FTP connection involves three parties to create and communicate on the network.
  • True
  • False Correct
Functionality indicates that there are up and running networks, programs, and software.
  • True Correct
  • False
How many pillars associated with information assurance?
  • 7
  • 3
  • 5 Correct
  • 4
Hubs are used to connect more than one computer and structure a network's architecture.
  • True Correct
  • False
IA seeks to preserve integrity on all computer systems through anti-virus software and ensure that all workers have access to know how to use their systems properly to minimize malware or viruses accessing information systems.
  • True Correct
  • False
Identifyexisting security services available for re-use
  • Phase E: Opportunities & Solutions Correct
Identifyexisting security services available for re-use. What phase is that?
  • Phase E: Opportunities & Solutions Correct
If one needs to access information of a particular employee to check whether an employee has withstood the number of leaves, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/change management.
  • True Correct
  • False
If security teams have to go back and reset the entire system to meet new parameters, _________________ occur, which can undermine the safety of the infrastructure.
  • Reconnect
  • Cyber Vulnerability
  • Disconnect Correct
  • Cyber Attack
If the extent of vulnerability is assessed to be high, and the adversary threat is apparent, adverse manipulation is expected, and the threats are assessed to be high.
  • True Correct
  • False
In a phasedimplementation the new security components are usually part of theinfrastructure in which the new system is implemented. The securityinfrastructure needs to be in a first or early phase to properly support theproject. What phase is that?
  • Phase F: Migration Planning Correct
In FTP, we need to complete all the operations to get the entire file.
  • True
  • False Correct
In information security, data integrity meansmaintaining and assuring the accuracy and consistency of data over its entirelife-cycle.
  • TRUE Correct
In network security, _______________________ have been the first line of protection for over 25 years.
  • firewalls Correct
  • anti-virus
  • Security assurance
  • VPN
In science use, _________________________________ is a technical and sociological approach to the problem of linking labs, records, machines, and individuals effectively, with the intention of allowing new scientific theories and information to be derived.
  • cyber bully
  • cyber infrastructure Correct
  • cybersecurity
  • cyberspace
In Stateful Packet Filtering, the connection pairs is consists of the following parameters except ___________.
  • The destination port
  • The destination device Correct
  • The source address
  • The source port
In the direct sense of information protection, well-defined security mechanisms are developed to distribute information regardless of its state of presence-transit, stored, or rest.
  • True
  • False Correct
In the information world, the National Institute of Standards and Technology has described cyberspace as:
  • interconnected information technology and the interdependent network of information technology infrastructures running through this medium
  • a global realm consisting of an interdependent network of infrastructures for information systems, including the internet, telephone networks, computer systems, and embedded processors and controllers Correct
  • the computational platform is an expansion to the contact channel between real people; cyberspace's central aspect is that it creates an ecosystem composed of several users with the potential to manipulate and manipulate each other
  • a global network of interdependent information technology infrastructures, telecommunications networks, and telecommunications systems
In the_____________, as the use of the internet, networking, and automated media both grew significantly, the word became popular, and the term cyberspace was able to describe the many new concepts and trends that arose.
  • 1980s
  • 1990s Correct
  • 1970s
  • 2000s
All courses