Your browser does not support JavaScript!

Information Assurance and Security 1

Showing 376-405 of 405 answers

True or False: Data classificationpolicy documentation
  • TRUE Correct
True or False: Identify communitiesinvolved (enterprises) - those stakeholders who will be affected by securitycapabilities and who are in groups of communities
  • TRUE Correct
True or False: Identify extendedenterprise (units) - those units outside the scoped enterprise who will need toenhance their security architecture for interoperability purposes
  • TRUE Correct
True or False: Identify softenterprise (units) - those who will see change to their capability and workwith core units but are otherwise not directly affected
  • TRUE Correct
True or False: Identify the securitygovernance involved, including legal frameworks and geographies (enterprises)
  • TRUE Correct
True or False: Risk analysisdocumentation
  • TRUE Correct
True or False: Written and publishedsecurity policy
  • TRUE Correct
Type of Concept for Cybercrime
  • Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet Correct
Using pathological system helps to manipulate people into giving knowledge or access to perpetrators requires psychological engineering. 
  • True
  • False Correct
Usually an infected host must be accessible outside of the local network to establish a command and control channel between the victim and the attacker. Once this bidirectional communication has been made, an attacker has access inside the target environment and can usually control the activity by manually launching commands;
  • Command and Control Correct
Usually means ensuring that only people who are allowed have access to unique properties and that access is effectively prohibited from being obtained by those who are unauthorized.
  • password
  • information
  • Confidentiality Correct
  • Utility
WAN network, data is _______.
  • centralized Correct
  • monitored
  • all of the choices
  • manipulated
WAN stands for ______________.
  • Wide Area Network Correct
  • Wires Area Network
  • Wireless Area Network
  • Wild Area Network
What are the steps in intrusion model?
  • Recon, Weaponise, Deliver, Exploit, Install, C2 and Action Correct
What is AES means? 
  • Advanced Encryption Standard Correct
  • Advance Entertainment Sequence
  • Advance Enhanced System
  • Advance
What is API means? 
  • application programming interprets
  • application programming intersection
  • application programming interfaces Correct
  • application programming interception
What raw facts with a known coding system?
  • Draft
  • Details
  • Data Correct
  • Design
What was the team that led the military operation in coining the term "operations security"?
  • Red Dragon
  • Red Dinosaur
  • Purple Dragon Correct
  • Purple Dinosaur
When a ________________________ happens, information security experts are interested in mitigating the breach's detrimental effects.
  • cyber breach Correct
  • cyber branch
  • cyber beach
  • cyber crime
When a cyber breach happens, information security experts are interested in mitigating the breach's detrimental effects. 
  • True Correct
  • False
When a new server is added to the server group, the load balancer automatically starts to send requests to it.
  • True Correct
  • False
When the company writes and develops the overall security strategies and mechanisms, the CIA triad can direct you.
  • True Correct
  • False
When the packets arrive to the router, the measured header checksum would be equal to the received header checksum, and the router accepts only the packet.
  • Destination Unreachable
  • Time Exceeded Message
  • Parameter Problem Correct
  • Source Quench Message
When these measures are placed in place, the Information Assurance then calls for different monitoring and auditing mechanisms to help a company understand how well the controls it has introduced reduce the danger.
  • True Correct
  • False
Which one is not a security threat in the IT world?
  • cyber bullying Correct
Who created a collection of sculptures and photographs entitled 'sensory spaces' under this name, which were focused on the concept of open structures adaptable to diverse influences, such as human movement and the actions of new materials.
  • Morris Worm; Sussane Ussing
  • Susanne Ussing; Carsten Hoff Correct
  • Donn Parker; Morris Worm
  • Carsten Hoff; Donn Parker
Who sets all the security controls against malicious actors, and how they apply to the overall device architecture?
  • Cyber Preservation Architecture Structure
  • Cyber Police
  • Cyber Protection Architecture Structure Correct
  • Cyber Attack Protection Council
Within an effective information security unit, several different main functions are necessary for the CIA Triad to be effectively delivered.
  • True Correct
  • False
XSS means:
  • Cross-Site Scripting Correct
  • External System Scripting
  • External Site Scripting
  • Experienced Site Scripting
You can cascade hubs to create network blockage.
  • True
  • False Correct
All courses