SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 305 Weeks Ago, 1 Day Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 20 Dec 2017 My Price 10.00

ultimately responsible for the security of information

Hello, I need help in my Intro Info System Security course IS211.

Thank you,

QUESTION 1

What are the three components of the CIA triangle?  What are they used for?

 

QUESTION 2

Who is ultimately responsible for the security of information in the organization? (Select all that apply)

 

CISO

 

CIO

 

CEO

 

CFO

 

QUESTION 3

Why do employees constitute one of the greatest threats to information security?

 

QUESTION 4

Is privacy a freedom from any observation?

 True

 False

 

QUESTION 5

What is risk management? (Seelct all that apply)

 

Identifying vulnerabilities in an organization’s information systems

 

Taking steps to ensure the confidentiality, integrity, and availability of all the components in the organization’s information system. 

 

Procure new security tools

 

Outsource risk to security vendor to prevent and mitigate

 

QUESTION 6

What are vulnerabilities?

 

A flaw or weakness in an information asset, security procedure, design, or control that could be exploited accidentally or on purpose to breach security.

 

Threat agents ability to access secure data

 

Robust and well tested software

 

A strength within an IT asset.

 

QUESTION 7

What documents are available from the NIST Computer Resource Center?

 

SP 800-12: An Introduction to Computer Security: The NIST Handbook

 

SP 800-14: Generally Accepted Security Principles and Practices for Securing Information Technology Systems

 

SP 800-18 Rev. 1: Guide for Developing Security Plans for Federal Information Systems

 

SP 800-26: Security Self-Assessment Guide for Information Technology Systems

 

All the above

 

QUESTION 8

Who is ultimately responsible for managing a technology? (Select all that apply)

 

Senior Management. 

 

Everyone in a supervisory position.

 

Your manager

 

The guy in the mailroom

 

QUESTION 9

Select the various types of firewalls work at what levels of the OSI model? (Select all that apply)

 

Packet filtering firewalls scan network data at Layer 3, of the OSI model. 

 

MAC layer firewalls are designed to operate at the media access control layer (layer 2) of the OSI model.

 

Application level firewalls will operate at OSI layers below layer 3.

 

Session based firewalls work at layer 5

 

QUESTION 10

 A common security system is an IDPS most like a burglar alarm

 True

 False

 

Attachments:

Answers

(5)
Status NEW Posted 20 Dec 2017 01:12 PM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)