Your browser does not support JavaScript!

Information Assurance and Security 2

Showing 76-93 of 93 answers

the inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining confidentiality, integrity, availability, accountability, authenticity, and reliability.”
  • IT security Correct
The need for skilled workers and allocation of funds for security within their budget: Companies are making the effort to allocate more funds in their budgets for security.
  • True Correct
The process to protect that data requires more advanced
  • IT security tool Correct
The requirements for applications that are connected to ________ will differ from those for applications without such interconnection.
  • external systems Correct
The weight given to each of the three major requirements describing needs for information security—confidentiality, integrity, and availability—depends strongly on
  • circumstances Correct
The_____must be managed by auditing, backup, and recovery procedures supported by general alertness and creative responses.
  • residual risk Correct
Theft of personal items such as pursues can result in more criminal opportunities such as:
  • Identity Theft, Stolen Auto, Residential Burglary Correct
Third Reason why investing in information security is significant
  • Proliferation of IoT devices Correct
timely, reliable access to data and information services for authorized users.
  • Availability Correct
To be useful, a ______ must not only state the security need (e.g., for confidentiality—that data shall be disclosed only to authorized individuals), but also address the range of circumstances under which that need must be met and the associated operating standards.
  • Security policy Correct
Types of private security.
  • Technology, Private Alarm Response, Private Patrol Services, Private Security Guards Correct
Walk without purpose, scan the area around you and make casual eye contact with others to display confidence.
  • False Correct
What jobs in information security is this? Salary: $103,560 Responsibilities: Software developers can be tasked with a wide range of responsibilities that may include designing parts of computer programs and applications and designing how those pieces work together.
  • Software developer Correct
What jobs in information security is this? Salary: $104,000 Responsibilities: Create an in-office network for a small business or a cloud infrastructure for a business with corporate locations in cities on opposite coasts
  • Computer Network Architects Correct
What jobs in information security is this? Salary: $139,000 Responsibilities: Information systems managers work toward ensuring a company's tech is capable of meeting their IT goals.
  • Computer and Information Systems Managers Correct
What jobs in information security is this? Salary: $95,510 Responsibilities: Information security analysts monitor their companies' computer networks to combat hackers and compile reports of security breaches.
  • Information Security Analyst Correct
While you are walking, keep your mind on what is going on around you.
  • True Correct
With __________ attacks, for example, even legitimate and honest users of an owner mechanism can be tricked into disclosing secret data.
  • Trojan horse Correct
All courses