Choose all that apply
Which of the following security controls will you use for the deployment phase of the SDLC to build
secure software Each correct answer represents a complete solution. Choose all that apply.
Which of the following encryption methods comes under symmetric encryption algorithm?
Which of the following encryption methods comes under symmetric encryption algorithm? Each
correct answer represents a complete solution. Choose three.
What phases are identified by DIACAP?
DIACAP applies to the acquisition, operation, and sustainment of any DoD system that collects,
stores, transmits, or processes unclassified or classified information since December 1997. What
phases are identified by DIACAP? Each correct answer represents a complete solution. Choose
all that apply.
Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities
Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities
Which of the following uses public key cryptography to encrypt the contents of files?
Which of the following uses public key cryptography to encrypt the contents of files?
What do you tell Bonny?
Management has asked you to perform a risk audit and report back on the results. Bonny, a
project team member asks you what a risk audit is. What do you tell Bonny?
Choose two
Which of the following are the major tasks of risk management Each correct answer represents a
complete solution. Choose two.
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm o…
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic
algorithm or a tool accepted by the National Security Agency for protecting classified information
which of the following categories can you deploy the access control?
An access control secures the confidentiality, integrity, and availability of the information and data
of an organization. In which of the following categories can you deploy the access control? Each
correct answer represents a part of the solution. Choose all that apply.
Which of the following steps are generally followed in computer forensic examinations?
Which of the following steps are generally followed in computer forensic examinations? Each
correct answer represents a complete solution. Choose three.