1. The official definition used by the US Government, as defined in the Federal Information Security Act (FISA), is “protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide integrity, confidentiality, and availability.”
(True/False)
Answer: True
2. The term information assurance, is defined as follows in NIST IR 72980 Revision 2, Glossary of Key Information Security Terms: Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
(True/False)
Answer: True
3. Describe CIA and when you are considered secured.
Answer: Confidentiality is protecting your data from unauthorized access, integrity is data is in its original form, no malicious activity has modified the data. Availability refers to data being accessible to authorized users as and when required.
You are considered secure it all your confidential data is encrypted and beyond the reach of attacker and can’t be Miss used, there cannot be any unwanted modifications to the data and also the data is available to you as and when required.
4. Which CISSP domain according to your session materials highlights intrusion detection and prevention systems?
Answer:
5. According to your session materials the Cybersecurity Act (the Act) was enacted on December 18, 2015, and includes a requirement for Federal Inspectors General to generate a report describing agency policies, procedures, and practices for covered systems. List three items the Act requires the report to include:
Answer:
6. According to your session materials which CISSP domain includes “Security Control Testing?”
Answer:
7. According to your session material describe the difference between standards, guidelines, and procedures.
Answer:
8. According to your session materials, organizational risk mitigation strategies reflect a(n) ______________ perspective on what mitigations are to be employed and where the mitigations are to be applied, to reduce information security risks to organizational operations and assets, the Nation, other organizations, and individuals.
Answer:
9. According to your session materials, risk is a measure of the extent to which an entity is threatened by a potential circumstance or event. What are the two related functions?
Answer:
10. Describe the four steps in the risk assessment process according to your session materials.
Answer:
11. According to your session materials, a ________________________ is a management, operational, and/or technical control employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines that provides equivalent or comparable protection for an information system
Answer:
12. According to one of the class OERs the purpose of the system security plan is to provide detailed security requirements of the system and describe the controls in place or planned for meeting those requirements.
(True/False)
Answer:
13. What are the steps in a detailed or formal risk analysis according to our session materials?
Answer:
14. The information flow model is an extension of the state machine concept and serves as the basis of design for both the Biba and Bell-LaPadula models.
(True/False)
Answer:
15. Describe Defense in Depth according to the materials in session 3.
Answer:
16. Describe Security Architecture according to your session materials.
Answer:
17. Describe Business Continuity Planning according to your session materials.
Answer:
18. Describe COBIT and what it is used for according to your session materials.
Answer:
19. According to our session materials, which US president described cybersecurity as one of the most important challenges we face as a Nation?
Answer:
20. According to your session materials how long should your individual risk research paper/project be?
Answer:
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more