Government categories of data classification include which of the following?
Government categories of data classification include which of the following? (Choose all that apply)
In the DoD accreditation process a __________ is the formal entity which ensures that information systems meet
In the DoD accreditation process a __________ is the formal entity which ensures that information systems meet a certain criteria for secure operation. Once approved these machines are certified to operate with a set of listed safeguards.
TCPWrappers is an example of which type of security tool?
TCPWrappers is an example of which type of security tool?
BIA – Business Impact Analysis deals strictly with financial assessment of a loss in relation to busines
BIA – Business Impact Analysis deals strictly with financial assessment of a loss in relation to business operations?
Of the protocols list, which one is connection oriented?
Of the protocols list, which one is connection oriented?
Corporate networks are safer if an end user connects through a VPN connection?
Corporate networks are safer if an end user connects through a VPN connection?
___________ programs decrease the number of security incidents, educate users about procedures, and can potent
___________ programs decrease the number of security incidents, educate users about procedures, and can potentially reduce losses.
DES, 3DES, Blowfish, and AES are all examples of what type of cryptography?
DES, 3DES, Blowfish, and AES are all examples of what type of cryptography?
Your ATM card is a form of two-factor authentication for what reason?
Your ATM card is a form of two-factor authentication for what reason?
A security policy is a rigid set of rules that must be followed explicitly in order to be effective.
A security policy is a rigid set of rules that must be followed explicitly in order to be effective.