Which of the following are among the eight areas of IA defined by DoD?

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.A...

November 3, 2020 No Comments READ MORE +

Which of the following penetration testing techniques automatically tests every phone line in an exchange and tries to locate modems that are attached to the network?

Which of the following penetration testing techniques automatically tests every phone line in an exchange and tries to locate modems that are attached to the network?A . Demon dialingB . SniffingC . Social engineeringD . Dumpster divingView AnswerAnswer: A Explanation: The demon dialing technique automatically tests every phone line in...

November 3, 2020 No Comments READ MORE +

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?

Which of the following organizations assists the President in overseeing the preparation of the federal budget and to supervise its administration in Executive Branch agencies?A . OMBB . NISTC . NSA/CSSD . DCAAView AnswerAnswer: A Explanation: The Office of Management and Budget (OMB) is a Cabinet-level office, and is the...

November 3, 2020 No Comments READ MORE +

Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities

SIMULATION Fill in the blank with an appropriate phrase. models address specifications, requirements, design, verification and validation, and maintenance activities.View AnswerAnswer: Life cycle Explanation: A life cycle model helps to provide an insight into the development process and emphasizes on the relationships among the different activities in this process. This...

November 3, 2020 No Comments READ MORE +

Which of the following NIST Special Publication documents provides a guideline on network security testing?

Which of the following NIST Special Publication documents provides a guideline on network security testing? A. NIST SP 800-42 B. NIST SP 800-53A C. NIST SP 800-60 D. NIST SP 800-53 E. NIST SP 800-37 F. NIST SP 800-59View AnswerAnswer: A Explanation: NIST SP 800-42 provides a guideline on network...

November 2, 2020 No Comments READ MORE +

Which of the following participants are required in a NIACAP security assessment?

The National Information Assurance Certification and Accreditation Process (NIACAP) is the minimum standard process for the certification and accreditation of computer and telecommunications systems that handle U.S. national security information. Which of the following participants are required in a NIACAP security assessment? Each correct answer represents a part of the...

November 2, 2020 No Comments READ MORE +

Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.

Which of the following process areas does the SSE-CMM define in the 'Project and Organizational Practices' category? Each correct answer represents a complete solution. Choose all that apply.A . Provide Ongoing Skills and KnowledgeB . Verify and Validate SecurityC . Manage Project RiskD . Improve Organization's System Engineering ProcessView AnswerAnswer:...

November 2, 2020 No Comments READ MORE +

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?

In which of the following types of tests are the disaster recovery checklists distributed to the members of disaster recovery team and asked to review the assigned checklist?A . Parallel testB . Simulation testC . Full-interruption testD . Checklist testView AnswerAnswer: D Explanation: A checklist test is a test in...

November 2, 2020 No Comments READ MORE +

Which of the following is a variant with regard to Configuration Management?

Which of the following is a variant with regard to Configuration Management?A . A CI that has the same name as another CI but shares no relationship.B . A CI that particularly refers to a software version.C . A CI that has the same essential functionality as another CI but...

November 2, 2020 No Comments READ MORE +

Which of the following is a variant with regard to Configuration Management?

Which of the following is a variant with regard to Configuration Management?A . A CI that has the same name as another CI but shares no relationship.B . A CI that particularly refers to a software version.C . A CI that has the same essential functionality as another CI but...

November 2, 2020 No Comments READ MORE +