Which of the following areas of information system, as separated by Information Assurance Framework…
Which of the following areas of information system, as separated by Information Assurance
Framework, is a collection of local computing devices, regardless of physical location, that are
interconnected via local area networks (LANs) and governed by a single security policy
Which of the following are examples of physical controls used to prevent unauthorized access to sensitive mate
Which of the following are examples of physical controls used to prevent unauthorized access to
sensitive materials?
Which of the following are the levels of public or commercial data classification system?
Which of the following are the levels of public or commercial data classification system? Each
correct answer represents a complete solution. Choose all that apply.
Choose all that apply
In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199.
What levels of potential impact are defined by FIPS 199 Each correct answer represents a
complete solution. Choose all that apply.
which of the following layers of the Open System Interconnection (OSI) model the Internet Control Message Prot
At which of the following layers of the Open System Interconnection (OSI) model the Internet
Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP) work?
which a business can obtain an economic advantage over its competitors?
Which of the following is a formula, practice, process, design, instrument, pattern, or compilation of
information which is not generally known, but by which a business can obtain an economic
advantage over its competitors?
information systems and produces foreign intelligence information
Which of the following federal agencies coordinates, directs, and performs highly specialized
activities to protect U.S. information systems and produces foreign intelligence information
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS) to encrypt the d
Which of the following two cryptography methods are used by NTFS Encrypting File System (EFS)
to encrypt the data stored on a disk on a file-by-file basis?
Which of the following backup sites takes the longest recovery time?
Which of the following backup sites takes the longest recovery time?
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by po
Which of the following firewall types operates at the Network layer of the OSI model and can filter
data by port, interface address, source address, and destination address
