Your browser does not support JavaScript!

Information Assurance and Security 1

Showing 226-300 of 405 answers

OPSEC is both an ____________________ used in risk management to detect information that can be abused by the attacker and used to gather sensitive information that may harm the organization's plans or credibility.
  • management process and an operation
  • insurance process and a tactics
  • investigative process and a technique Correct
  • security process and a plan
OPSEC is generally concerned with protecting against non-sensitive data being aggregated together. It often still uses technical countermeasures that are used to protect sensitive data.
  • True Correct
  • False
OPSEC means:
  • Optional Security
  • Operation Security Correct
  • Operation Section
  • Option Section
OPSEC planning does not require a clear understanding of the activity's mission and organizational plans.
  • True
  • False Correct
Organizations are investing in security protocols and digital frontiers to tackle the crisis.
  • True Correct
  • False
OSPF means:
  • Open Shortest Path First Correct
  • Open Site Patent Function
  • Open Site Patency Fabrication
  • Open Series Pathway Feature
Physical attack anddestruction, including:  electromagneticattack, visual spying, intrusion, scavenging and removal, wiretapping, interference,  and eavesdropping.
  • Attacker's Operations Correct
Physical security consist in the closure of IT equipment in a dedicated spaceand the provision of access control.
  • Prevent Cyber-Attacks Correct
PoE stands for _________________.
  • Power on Ethernet
  • Passive over Ethernet
  • Passive on Ethernet
  • Power over Ethernet Correct
POLAN stands for ________________.
  • Private Optical Local Area Network
  • Possessive Oblique Local Area Network
  • Passive Optical Local Area Network Correct
  • Public Optical Local Area Network
Popular technological counter-measures include defending against various malware forms that result in a data breach and data leakage.
  • True Correct
  • False
Possible acts of human incompetence or mistake, inadvertent acts, intentional acts of espionage or trespassing, possible improvements in service level by service providers, and natural disasters are not the key risks to physical protection.
  • True
  • False Correct
Prerequisites for non-repudiation are data confidentiality and notification.
  • True
  • False Correct
Primary application of the ICMP protocol is to ___________.
  • Perform network diagnostic Correct
  • Perform network control
  • Perform error control
  • Perform error correction
privacy, integrity can be directly violated by an attack vector such as:
  • remote wipe capabilities
  • authentication mechanisms
  • adequate education and training for all individuals
  • tampering for intrusion prevention devices Correct
Processed data
  • Information Correct
Protocols for this purpose are referred to as ____________.
  • balanced routing protocols
  • interior routing protocols Correct
  • enhanced routing protocols
  • exterior routing protocols
Proxy servers act as a firewall and web filter to speed up common requests, have shared network access, and cache data.
  • True Correct
  • False
Redirect data packet requests to an alternative path.
  • Destination Unreachable
  • Time Exceeded message
  • Redirection Message Correct
  • Parameter Problem
Regulation assurance is based on a simple review of the specifications.
  • True
  • False Correct
Research, target identification and selection: it may be lookingfor e-mail addresses, social relationships, or data about a particulartechnology, information displayed on various websites;
  • Reconnaissance Correct
Review the existing defenses to assess whether, if any, vulnerabilities or flaws exist that can be used to obtain access to your personal information.
  • True Correct
  • False
Revisitassumptions regarding interconnecting systems beyond project control, Identify and evaluate applicable recognized guidelinesand standards and Identify methods to regulate consumption of resources. What phase is that?
  • Phase D: Technology Architecture Correct
Risk Management Procedure consists of six steps.
  • · Make risk management decisions · Prioritize countermeasure options · Assess risks · Assess vulnerabilities · Assess threats Correct
Risks not avoided ortransferred are retained by  theorganization.
  • Risk Acceptance Correct
Routers run on the OSI models ______________.
  • Layer 1
  • Layer 2
  • Layer 4
  • Layer 3 Correct
Rules cannot include IP addresses for the source/destination.
  • True
  • False Correct
s a variety ofongoing measures taken to  reduce thelikelihood and severity of accidental and intentional  alteration, destruction, misappropriation,misuse, misconfiguration,  unauthorizeddistribution, and unavailability of an organization’s  logical and physical assets, as the result ofaction or inaction by  insiders and knownoutsiders, such as business partners.”
  • Personnel Security Correct
Safety engineers assess the capabilities and limitations of their IT and information infrastructure organizations.
  • True
  • False Correct
Safety managers assess the capabilities and limitations of their IT and information infrastructure organizations.
  • True
  • False Correct
Security analysts typically include the use of Hashing Algorithms such as MD5 and SHA1 to verify data integrity.
  • True
  • False Correct
Security architecture is associated with IT architecture; however, it may take a variety of forms. It generally includes a catalog of conventional controls in addition to relationship diagrams, principles, and so on.
  • Drivers
  • Financial
  • Form Correct
  • Relationship and Dependencies
Security Architecture tackles the following areas except __________.
  • Security Protocols
  • Security Analysis Correct
  • Account creation and management
  • Security roles and responsibilities
Security architectureaddresses non-normative flows through systems and among applications.
  • TRUE Correct
Security architecturecalls for its own unique set of skills and competencies of the enterprise andIT architects.
  • TRUE Correct
Security architecturecomposes its own discrete views and viewpoints.
  • TRUE Correct
Security architecturehas its own discrete security methodology.
  • TRUE Correct
Security architectureintroduces its own normative flows through systems and among applications.
  • TRUE Correct
Security architectureintroduces unique, single-purpose components in the design.
  • TRUE Correct
Security control and network control should not be the responsibility of the same group.
  • Authorization
  • Automation
  • Dual Control Correct
  • Access Control
Security environments are made up of several layers, ensuring that once attackers discover an entry point to obtain access, they are more likely to breach further layers to get deeper within.
  • True Correct
  • False
Security is characterized as _________________.
  • diluted-free, distance-free
  • distance-free, detail-free
  • danger-free, damage-free Correct
  • declare-free, detain-free
Security management consists of cultivating a security-conscious corporate culture, designing concrete policies that promote security, and handling the multitude of components that make up the structure.
  • True Correct
  • False
Security management experts must identify the key threat mechanisms in an organization so that they can be handled.
  • True Correct
  • False
Security management has been developing since the beginning of the _________________________.
  • 20th Century Correct
  • 17th Century
  • 18th Century
  • 19th Century
Security management practitioners will vary from building guards to IT professionals who design high-tech network infrastructure and software applications.
  • True Correct
  • False
Security services and processes are implemented, operated, and controlled.
  • Operations and Monitoring
  • Architecture Risk Assessment
  • Implementations Correct
  • Security Architecture and Design
Security systems should help:
  • respond, delay, distance
  • detect, delay, respond Correct
  • delay, resistance, distance
  • detect, random, dilute
Sent by the SNMP manager to the agent to issue configurations or commands.
  • Get Request
  • Set Request Correct
  • SNMP Trap
  • SNMP Response
Sent by the SNMP manager to the agent to obtain large tables of data by performing multiple GetNext Request commands.
  • GetBulk Request Correct
  • Get Request
  • SNMP Bulk
  • SNMP Request
Service Availability is the percentage of time during which a service can be used to be designed and built for originally.
  • True Correct
  • False
Seven Stages of lifecycle model
  • Requirements, Design, Coding, Testing, Deployment, Production and Decommission Correct
Shift the risk tosomeone else.
  • Risk Transfer Correct
Six Concept of CyberCrime
  • Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet Correct
SNMPv2 is defined in _______.
  • RFC 1157
  • RFC 3410
  • RFC 1901 Correct
  • RFC 1141
Some of the data assurance tools are physical, such as combination locks or keyboard entries, paying guards, and ___________________.
  • keycard-controlled access Correct
  • profiling
  • ID verification
  • social media passcode
State-of-the-art inspections occur at all levels of the network and provide additional protection, especially in connected protocols
  • True
  • False Correct
Stateful packet filtering firewalls cannot completely access higher-layer protocols and application services for inspection.
  • True Correct
  • False
Taking actions toreduce the losses due to a risk;  manytechnical countermeasures fall into this category.
  • Risk mitigation Correct
TCP stands for _____________________.
  • Transfer Control Procedure
  • Transfer Control Protocol
  • Transmission Control Protocol Correct
  • Transmission Control Procedure
Tests and measurements", "aggressive monitoring", "network efficiency monitoring" or simply "network assurance" are also referred to as ___________________.
  • service assurance tools Correct
  • endurance assurance tools
  • compliance assurance tools
  • operation assurance tools
The ___________ is something that the remote user discovers because he does not know the name of the server with whom he is currently interacting.
  • Web Application Firewall
  • Packet Filtering
  • Stateful Packet filtering
  • Proxy Correct
The ______________ can be deployed inside the house, which is also called a home network.
  • selected network
  • offline network Correct
  • global network
  • localized network
The _________________ is expanding the physical security sphere, as smart devices linked through the internet to business systems can be placed beyond the protected perimeters defined.
  • IoT Correct
  • JoT
  • DoT
  • SoT
The ability of theenterprise to function without service interruption or depletion despiteabnormal or malicious events.
  • Availability Correct
The ability to addand change security policies, add or change how policies are implemented in theenterprise, and add or change the persons or entities related to the systems.
  • Administration Correct
The ability to testand prove that the enterprise architecture has the security attributes requiredto uphold the stated security policies.
  • Assurance Correct
The ability toprovide forensic data attesting that the systems have been used in accordancewith stated security policies.
  • Audit Correct
The accuracy of the data structures and the existence of the stored data.
  • Ultimate
  • Integrity Correct
  • Authenticity
  • Confidentiality
The amount of packet loss-related SLAs generally is:
  • less than or equal to 01 percent Correct
  • more than or equal to 01 percent
  • less than or equal to 04 percent
  • more than or equal to 04 percent
The best way to find the vulnerable point of your device is to hire cyber insurance services.
  • True
  • False Correct
The CIA model is too limited, according to many other cybersecurity experts as well, and certain elements are not adequately shielded. That is why Parker added the three extra elements.
  • True Correct
  • False
The CIA Triad is so _________________________ that you can be confident that one or more of these values have been compromised. If data is leaked, a device is targeted, a user takes a phishing bait, an email is hacked, a website is maliciously shut offline, or any variety of other security events occur.
  • center of system assurance
  • center of infrastructure unit
  • central to information security Correct
  • center of data mitigating
The complex protocol contains the following three fields except ______________.
  • The minor code that contains more information about the kind of field
  • The checksum that helps detect errors introduced during transmission
  • The primary type that identifies the ICMP message
  • The message containing the protocol used Correct
The Control Connection uses very complex rules as data types may vary.
  • True
  • False Correct
All courses