What are the process activities of this phase Each correct answer represents a complete solution?

The Phase 2 of DITSCAP C&A is known as Verification. The goal of this phase is to obtain a fully integrated system for certification testing and accreditation. What are the process activities of this phase Each correct answer represents a complete solution? Choose all that apply.A . Assessment of the...

August 13, 2020 No Comments READ MORE +

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space

Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application spaceA . Internet Protocol Security (IPSec)B . Common data security architecture (CDSA)C . File encryptorsD . Application program interface (API)View AnswerAnswer: B

August 12, 2020 No Comments READ MORE +

Which of the following statements are true about Certification and Accreditation Each correct answer represents a complete solution?

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or after a system is in operation. Which of the following statements are true about Certification and Accreditation Each correct answer represents a...

August 12, 2020 No Comments READ MORE +

Which of the following diagrams will help you to show all of the function requirements and their groupings in one diagram?

You work as a systems engineer for BlueWell Inc. You are working on translating system requirements into detailed function criteria. Which of the following diagrams will help you to show all of the function requirements and their groupings in one diagram?A . Activity diagramB . Functional flow block diagram (FFBD)C...

August 12, 2020 No Comments READ MORE +

Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution?

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD Each correct answer represents a complete solution? Choose all that apply.A...

August 12, 2020 No Comments READ MORE +

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threats

Which of the following documents contains the threats to the information management, and the security services and controls required to counter those threatsA . System Security ContextB . Information Protection Policy (IPP)C . CONOPSD . IMMView AnswerAnswer: B

August 11, 2020 No Comments READ MORE +

You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is needed

You work as a security engineer for BlueWell Inc. You are working on the ISSE model. In which of the following phases of the ISSE model is the system defined in terms of what security is neededA . Define system security architectureB . Develop detailed security designC . Discover information...

August 11, 2020 No Comments READ MORE +

Which of the following will you recommend for providing security?

You work as a Network Administrator for PassGuide Inc. You need to secure web services of your company in order to have secure transactions. Which of the following will you recommend for providing security?A . HTTPB . VPNC . SMIMED . SSLView AnswerAnswer: D

August 11, 2020 No Comments READ MORE +

Fill in the blank with an appropriate phrase. __________ seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes

SIMULATION Fill in the blank with an appropriate phrase. __________ seeks to improve the quality of process outputs by identifying and removing the causes of defects and variability in manufacturing and business processes.View AnswerAnswer: Six Sigma

August 10, 2020 No Comments READ MORE +

Which of the following is a type of security management for computers and networks in order to identify security breaches

Which of the following is a type of security management for computers and networks in order to identify security breachesA . IPSB . IDSC . ASAD . EAPView AnswerAnswer: B

August 10, 2020 No Comments READ MORE +