The IISSCC divides controls into 10 _____, while NIST organizes controls into three _____ and 17 _____. (Points : 5) domains, classes, familie
Question 2.2. (TCO 2) The IISSCC divides controls into 10 _____, while NIST organizes controls into three _____ and 17 _____. (Points : 5) domains, classes, families domains, controls, families families, controls, classes domains, families, classes controls, domains, families |
Question 3.3. (TCO 2) What are the pillars of security? (Points : 5) Confidentiality, integrity, and availability Detection, prevention, and recovery People, process, and technology Administration, technology, and operation |
Question 4.4. (TCO 3) Security management should ensure that policies established for information security distinguish the _____ of assets, organize people by _____, and manage _____ because that is the enemy of security. (Points : 5) people, separation of duties, technology sensitivity, separation of duties, complexity technologies, importance, people taxonomy, separation of duties, complexity labels, accounts, complexity |
Question 5.5. (TCO 4) “There shall be a way for an individual to correct information in his or her records” is a clause that might be found in a _____. (Points : 5) law code of ethics corporate policy fair information practices statement Any of the above |
Question 6.6. (TCO 5) Security models are _____ that are used to _____ ideas, and are not meant to be _____. (Points : 5) solutions, implement, abstractions abstractions, evaluate, solutions abstractions, implement, solutions solutions, document, abstractions documents, implement, solutions |
Question 7.7. (TCO 6) Many believe that the most important physical security control is _____. (Points : 5) closed-circuit television a good security plan an educated workforce certified security staff resources |
Question 8.8. (TCO 7) The mission of the security operations center might best be described as _____. (Points : 5) continuous monitoring maintaining the known good state policy enforcement reporting to management configuration management |
Question 9.9. (TCO 8) Alternate sites used in disaster recovery would normally not include which of the following? (Points : 5) Hot site Cold site Warm site Shared site Alternate site |
Question 10.10. (TCO 9) Mandatory access control uses labels and rules to mediate access to _____ by _____. (Points : 5) objects, subjects files, people computer cycles, applications information assets, people information assets, network devices |
Question 11.11. (TCO 10) As a generalization, symmetric cryptography is used to encrypt _____, and asymmetric cryptography is used to encrypt _____. (Points : 5) messages, identities data, identities data, signatures data, messages messages, signatures |
Question 12.12. (TCO 10) In a given city, there are a group of people who wish to communicate through the use of asymmetric cryptography. They do not wish to work with any type of certificate authority. Given this information, how would this be accomplished? (Points : 5) Internal certificate authority Private extranet Public VPN provider IPSec tunnels Utilize PGP |
Question 13.13. (TCO 11) A bastion host can be used as an application-level gateway or a circuit-level gateway (or both) because it implements application-specific _____. (Points : 5) software proxy hardware encryption models |
Question 14.14. (TCO 12) In addition to normal functional and assurance bugs, intrusion detection is subject to two kinds of errors called _____ and _____. (Points : 5) type a, type b false positive, false negative hardware, software functional, assurance performance, availability |
Question 15.15. (TCO 13) All of the following are obscure reasons why distributed systems are more prevalent now than in the past, expect for which one?(Points : 5) |
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"
