Your browser does not support JavaScript!

Information Assurance and Security 1

Showing 151-225 of 405 answers

Infecting a victim system with a computer trojan, backdoor or other malware application of this type that ensures the attacker’s presence in the target environment;
  • Installation Correct
Information and datamanipulation
  • Information Infrastructure Correct
Information assurance guarantees the information in all ways and during all exchanges is confidential,________________, availability, ownership, utility, accuracy, non-repudiation, permitted use, and safety.
  • communication
  • punctuality
  • confidentiality Correct
  • integrity
Information Assurance is at the heart of ____________________.
  • Information Manipulation
  • Information Organization
  • Information System
  • Information Management Correct
Information can be physical or electronic, tangible, or intangible.
  • True Correct
  • False
Information can be used to distinguish an individual's identity from another or be used to deanonymize anonymous data.
  • DoD
  • CIL
  • PII Correct
  • CALI
Information Security and Cybersecurity have also been used interchangeably, although with some overlap, cybersecurity and information security address numerous goals and scopes. 
  • True Correct
  • False
Information security covers all steps taken in advance to stop adverse incidents arising in the knowledge, data and its meaning to depend on the knowledge, data and its meaning. 
  • True Correct
  • False
Information security is also known as:
  • Infosec Correct
  • info-s
  • IS
  • i-sec
Information security is_____________________, and effective trained persons are essential for this reason in order to efficiently supervise the security systems.
  • systematic
  • endurance
  • possible
  • vital Correct
Information securitytechnical measures  such as:        encryption and key management,intrusion  detection, anti-virussoftware, auditing, redundancy, firewalls, policies and standards.
  • Defender's Operations Correct
Information technology ____________________ act as the framework for the application of the baseline of corporate information security.
  • sub-domains
  • domains Correct
  • html page
  • intellectual vitality
Involves theimplementation of standard  operationalsecurity procedures that define the nature and frequency of the interaction between users, systems, and system  resources, the purpose of which is to.
  • Operational Security Correct
IP packets show where they originated.
  • The source IP address of the outgoing packets
  • The type of IP the pocket contains
  • The source IP address of the incoming packets Correct
  • Destination IP addresses
Is a collection ofall the trust  mechanisms of a computersystem which collectively enforce the policy.
  • TCB Correct
Is a generic termthat implies a mechanism in place to provide a basis for confidence in the reliability/security of the  system.
  • Trust Correct
Is a measure ofconfidence that the security features, practices, procedures, and architecture of a system accurately  mediates and enforces the security policy.
  • Assurance Correct
Is a process, not anend state
  • Security Correct
Is data  endowed with relevance  and purpose.
  • Information Correct
Is it true or false. An additional risk occurs when personal information is stored in client accounts on commercial websites, which may become the target of cyber-attacks anytime, so stored data becomes vulnerable is some basic steps in storing personal data
  • True Correct
Is it true or false. Encrypting all personal information when saved on different storage media is some basic steps in storing personal data.
  • True Correct
Is it true or false. Storage the minimum required data online and maximum discretion in providing them to a third party (users, companies) is some basic steps in storing personal data.
  • True Correct
Is it true or false. The use of complex, unique, hard to guess or break passwords, consisting of numbers, upper/lower case letters and special characters is some basic steps in storing personal data.
  • True Correct
Is it true or false. Using encrypted versions of protocols when sensitive information is exchanged so as to ensure data confidentiality and prevent identity theft is some basic steps in storing personal data.
  • True Correct
Is roughly equivalent to privacy
  • Confidentiality Correct
Is the inherenttechnical features and functions that collectively contribute to an IT infrastructure achieving and  sustaining confidentiality, integrity,availability, accountability,
  • IT Security Correct
Is the process by whichan asset is managed from its  arrival orcreation to its termination or destruction.
  • Lifecycle Correct
Is the process of maintaining an acceptable level of perceived risk
  • Security Correct
Is thestudy of how to protect your  informationassets from destruction, degradation, manipulation and  exploitation.
  • Information Assurance Correct
It applies to the credibility and the reality of the information's sources.
  • Utility
  • Authenticity Correct
  • Availability
  • Integrity
It can provide a collection of specifications and procedures that are not only documentable but also repeatable.
  • Security Engineering
  • Security Control
  • Security Architecture
  • Security Infrastructure Correct
It concerns the physical security of facilities, persons, and goods and the safety of information, networks, and telecommunications systems.
  • Security Management Correct
  • Security Analysis
  • Physical Management
  • Security Design
It controls the preservation of information, which is one of the many things that a company wants to secure
  • Company Policy
  • Security Policy Correct
  • Cyber Policy
  • Network Policy
It evaluates the business influence of vital business assets and the odds and effects of vulnerabilities and security threats.
  • Architecture Risk Assessment Correct
  • Implementation
  • Form
  • Operations and Monitoring
It is a comprehensive strategy that helps business processes to restart or proceed despite a security incident.
  • Risk Assessment
  • Incident Management
  • Incident Assessment
  • Catastrophe Recovery Correct
It is a critical method for efficient network management.
  • ICMP
  • TCP
  • FTP
  • SNMP Correct
It is a mechanism that defines the organizational configuration, protocols, rules, and functional behavior of a computer network, covering both protection and network functionality.
  • Cybersecurity Architecture Correct
  • Security Design
  • Operational Security
  • Security Analysis
It is a person who anticipates possible cyber-attacks and is quick to develop mechanisms and programs to avoid them.
  • Software Engineer
  • Software Architect
  • Security Architect Correct
  • Security Engineer
It is a support protocol used by network devices such as routers to transmit error messages and operations information.
  • SNMP
  • ICMP Correct
  • FTP
  • DNS
It is a type of OPSEC problem that is deliberate but varies in its degree of maliciousness.
  • Security Misconfiguration
  • Accidental Misconfiguration
  • Natural Misconfiguration
  • Deliberate Misconfiguration Correct
It is all about usefulness
  • Availability
  • Utility Correct
  • Confidentiality
  • Availability
It is the most frequent type of operational issues.
  • Accidental Misconfiguration Correct
  • Security Misconfiguration
  • Natural Misconfiguration
  • Deliberate Misconfiguration
It is the use and set of hardware and software, including special tools.
  • Information Security
  • Property Security
  • Personal Security
  • Computer Security Correct
It is where the intruder sends a ping greater than the actual acceptable size of the packet to the target computer, forcing the computer to freeze or crash.
  • Flood attack
  • Ping of Death Attack Correct
  • Smurf Attack
  • Shutdown Attack
It must recognize the assets of an organization as well as all possible risks to those assets.
  • Company Policy
  • Cyber Policy
  • Network Policy
  • Security Strategies Correct
IT network assurance is for:
  • corporate networks and IT divisions of a business Correct
  • corporate aesthetic and VP divisions of the business
  • corporate satutories and Operation divisions of the business
  • corporate system and HR divisions of business
It originated as a military term that described strategies to prevent potential adversaries from discovering critical operations-related data.
  • Aggregation
  • Purple Dragon
  • Operations Security Correct
  • Military Operation
IT protection departments should follow an emergency response strategy before or after an accident as a _________________ to maintain control of the situation.
  • risk management motivation
  • risk management manipulation
  • risk management mitigating
  • risk management mechanism Correct
IT protection removes __________________ attacks and future __________________ of protection that can have a significant effect on the organization.
  • mitigating; documentation
  • managing; strategies
  • malicious; violations Correct
  • manufactured; accounts
It should be avoided, and writers should be careful to use the proper meaning of terms or generic words.
  • Spaces
  • Deep words
  • Ambiguous sentences Correct
  • Long paragraphs
It should be:  accurate, timely, complete, verifiable,consistent,  available.
  • Knowledge Correct
Jitter SLAs range from:
  • 4 ms and up to 5 ms
  • 2 ms and up to 10 ms Correct
  • 01 ms and up to 5 ms
  • 3 ms and up to 11 ms
Knowledge acquired through experience or study.
  • Facts
  • History
  • Insite
  • Information Correct
Knowledge can be the result of _________________ produced from simple information facts
  • inferences and implications Correct
  • interaction and imposition
  • infection and complications
  • none of the above
Known as a procedural protection.
  • INFOKILL
  • ITSEC
  • INFOSEC
  • OPSEC Correct
Logical security consists in software that are necessary to control theaccess to information and services of a system. The logical level is dividedinto two categories: access security level and service security level.
  • Prevent Cyber-Attacks Correct
Making a malware application (for example, a computer trojan)that, combined with an exploitable security breach, allows remote access.Moreover, PDF (Portable Document Format) files or Microsoft Officesuite-specific files can be regarded as weapons available to the attacker;
  • Weaponization Correct
MAN stands for ______________.
  • Manual Area Network
  • Massive Area Network
  • Metropolitan Area Network Correct
  • Manipulated Area Network
Many major companies are now leading information security teams with a ________________________.
  • Chief In-Out Officer
  • Chief Information Officer Correct
  • Chief Head Officer
  • Chief Incharge Personnel
Many securityvulnerabilities originate as design or code errors and the simplest and leastexpensive method to locate and find such errors is generally an early review byexperienced peers in the craft. What phase is that?
  • Phase G: Implementation Governance Correct
Modem and data of consumer and business information are the most important considerations, particularly for all other reasons for information security in the e-commerce context.
  • True
  • False Correct
Modern computing best practice typically allows more servers to be added to the cost-effective scale to accommodate these large volumes.
  • True Correct
  • False
MTTR is the time that it takes for the service provider to repair the fault. Often this is defined in minutes. 
  • True Correct
  • False
Network ____________________ verify the best practices and skills needed by administrators of network security to execute their duties effectively.
  • security certificates Correct
  • security benefits
  • security verification
  • security analogy
Network assurance organizations ensure the proper execution of ______________ during periods of dramatic network transition.
  • protocols and defenses Correct
  • call outs and security
  • system and policies
  • regulations and contracts
Network security architecture:
  • Cybersecurity architecture Correct
  • security architect
  • DevOps
  • Security engineering
Network vulnerabilities cause threats such as spyware and malware to become part of a company's network.
  • Phishing and Identity Theft
  • Vulnerability Management Correct
  • Endpoint Security
  • Penetration Test
new hires can have access to information that is critical, confidential and important, thereby increasing the _________________________ of the organizations within which they operate.
  • identification profile
  • risk profile Correct
  • company profile
  • unified profile
Not performing an activitythat would incur risk.
  • Risk Avoidance Correct
Notice that integrity goes hand and hand with the___________________.
  • trust concept
  • confidentiality concept
  • honesty concept
  • non-repudiation concept Correct
Once technology architects discover flaws in current networks, they create a new design to improve security frameworks.
  • True
  • False Correct
Once this bidirectional communication has been made, an attacker has access inside the target environment and can usually control the activity by manually launching commands;
  • command and control Correct
Only the current packet is looked at by stateful packet filtering.
  • True
  • False Correct
Operational problems require operational solutions and operational competence of the organization.
  • True Correct
  • False
OPSEC analyst determines what critical information the adversary cannot derive based on the known threat and assessed vulnerabilities.
  • True
  • False Correct
All courses