Choose all that apply
The DoD 8500 policy series represents the Department’s information assurance strategy. Which of
the following objectives are defined by the DoD 8500 series Each correct answer represents a
complete solution. Choose all that apply.
Which of the following cooperative programs carried out by NIST speed ups the development of modern technologi
Which of the following cooperative programs carried out by NIST speed ups the development of
modern technologies for broad, national benefit by co-funding research and development
partnerships with the private sector
Which of the following schemes is used by the Kerberos authentication?
Which of the following schemes is used by the Kerberos authentication?
What can Rachael do in this instance?
Rachael is the project manager for a large project in her organization. A new change request has
been proposed that will affect several areas of the project. One area of the project change impact
is on work that a vendor has already completed. The vendor is refusing to make the changes as
they’ve already completed the project work they were contracted to do. What can Rachael do in
this instance?
Which of the following activities is performed in this security awareness process?
Mark works as a security manager for SoftTech Inc. He is performing a security awareness
program. To be successful in performing the awareness program, he should take into account the
needs and current levels of training and understanding of the employees and audience. There are
five key ways, which Mark should keep in mind while performing this activity. Current level of
computer usage What the audience really wants to learn How receptive the audience is to the
security program How to gain acceptance Who might be a possible ally Which of the following
activities is performed in this security awareness process?
Choose all that apply
Which of the following characteristics are described by the DIAP Information Readiness
Assessment function Each correct answer represents a complete solution. Choose all that apply.
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm …
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted by the National Security Agency for protecting sensitive, unclassified
information in the systems as stated in Section 2315 of Title 10, United States Code
Which of the following is most appropriate for this client?
You are advising a school district on disaster recovery plans. In case a disaster affects the main IT
centers for the district they will need to be able to work from an alternate location. However,
budget is an issue. Which of the following is most appropriate for this client?
How many change control systems are there in project management?
How many change control systems are there in project management?
Choose all that apply
The functional analysis process is used for translating system requirements into detailed function
criteria. Which of the following are the elements of functional analysis process Each correct
answer represents a complete solution. Choose all that apply.