Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to develop
Which of the following acts assigns the Chief Information Officers (CIO) with the responsibility to
develop Information Technology Architectures (ITAs) and is also referred to as the Information
Technology Management Reform Act (ITMRA)
Which of the following protocols is used by VPN for tunneling?
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network.
The company has two offices in different cities. The company wants to connect the two offices by
using a public network. You decide to configure a virtual private network (VPN) between the
offices. Which of the following protocols is used by VPN for tunneling?
Which of the following laws enacted in United States makes it illegal for an Internet Service Provider (ISP) t
Which of the following laws enacted in United States makes it illegal for an Internet Service
Provider (ISP) to allow child pornography to exist on Web sites?
Choose all that apply
The Concept of Operations (CONOPS) is a document describing the characteristics of a proposed
system from the viewpoint of an individual who will use that system. Which of the following points
are included in CONOPS Each correct answer represents a complete solution. Choose all that
apply.
Which of the following topologies should John use to accomplish the task?
John works as a Network Administrator for NetPerfect Inc. The company has a Windows-based
network. John has been assigned a project to build a network for the sales department of the
company. It is important for the LAN to continue working even if there is a break in the cabling.
Which of the following topologies should John use to accomplish the task?
Which of the following representatives of incident response team takes forensic backups of the systems that ar
Which of the following representatives of incident response team takes forensic backups of the
systems that are the focus of the incident?
Which of the following DoD policies establishes IA controls for information systems according to the Mission A
Which of the following DoD policies establishes IA controls for information systems according to
the Mission Assurance Categories (MAC) and confidentiality levels
Which of the following processes describes the elements such as quantity, quality, coverage, timelines…
Which of the following processes describes the elements such as quantity, quality, coverage,
timelines, and availability, and categorizes the different functions that the system will need to
perform in order to gather the documented missionbusiness needs
Which of the following encryption algorithms are based on block ciphers?
Which of the following encryption algorithms are based on block ciphers?
Which of the following Internet laws has the credit card issuing company violated?
A Web-based credit card company had collected financial and personal details of Mark before
issuing him a credit card. The company has now provided Mark’s financial and personal details to
another company. Which of the following Internet laws has the credit card issuing company
violated?