Homework

Homework Questions? Ask a Tutor for Answers ASAP

Ask an Expert,
Get an Answer ASAP!

CO 1) Which of the following should not be the basis policy?

Customer Question
CO 1) Which of the...
CO 1) Which of the following should not be the basis for security policy? (Points : 5)
Legislation
Corporate directives
Corporate needs
Vendor documentation
Situation awareness reporting
Question 2.2. (TCO 2) The IISSCC divides controls into 10 _____, while NIST organizes controls into three _____ and 17 _____. (Points : 5)
domains, classes, families
domains, controls, families
families, controls, classes
domains, families, classes
controls, domains, families
Question 3.3. (TCO 2) What are the pillars of security? (Points : 5)
Confidentiality, integrity, and availability
Detection, prevention, and recovery
People, process, and technology
Administration, technology, and operation
Question 4.4. (TCO 3) Security management should ensure that policies established for information security distinguish the _____ of assets, organize people by _____, and manage _____ because that is the enemy of security. (Points : 5)
people, separation of duties, technology
sensitivity, separation of duties, complexity
technologies, importance, people
taxonomy, separation of duties, complexity
labels, accounts, complexity
Question 5.5. (TCO 4) "There shall be a way for an individual to correct information in his or her records" is a clause that might be found in a _____. (Points : 5)
law
code of ethics
corporate policy
fair information practices statement
Any of the above
Question 6.6. (TCO 5) Security models are _____ that are used to _____ ideas, and are not meant to be _____. (Points : 5)
solutions, implement, abstractions
abstractions, evaluate, solutions
abstractions, implement, solutions
solutions, document, abstractions
documents, implement, solutions
Question 7.7. (TCO 6) Many believe that the most important physical security control is _____. (Points : 5)
closed-circuit television
a good security plan
an educated workforce
certified security staff
resources
Question 8.8. (TCO 7) The mission of the security operations center might best be described as _____. (Points : 5)
continuous monitoring
maintaining the known good state
policy enforcement
reporting to management
configuration management
Question 9.9. (TCO 8) Alternate sites used in disaster recovery would normally not include which of the following? (Points : 5)
Hot site
Cold site
Warm site
Shared site
Alternate site
Question 10.10. (TCO 9) Mandatory access control uses labels and rules to mediate access to _____ by _____. (Points : 5)
objects, subjects
files, people
computer cycles, applications
information assets, people
information assets, network devices
Question 11.11. (TCO 10) As a generalization, symmetric cryptography is used to encrypt _____, and asymmetric cryptography is used to encrypt _____. (Points : 5)
messages, identities
data, identities
data, signatures
data, messages
messages, signatures
Question 12.12. (TCO 10) In a given city, there are a group of people who wish to communicate through the use of asymmetric cryptography. They do not wish to work with any type of certificate authority. Given this information, how would this be accomplished? (Points : 5)
Internal certificate authority
Private extranet
Public VPN provider
IPSec tunnels
Utilize PGP
Question 13.13. (TCO 11) A bastion host can be used as an application-level gateway or a circuit-level gateway (or both) because it implements application-specific _____. (Points : 5)
software
proxy
hardware
encryption
models
Question 14.14. (TCO 12) In addition to normal functional and assurance bugs, intrusion detection is subject to two kinds of errors called _____ and _____. (Points : 5)
type a, type b
false positive, false negative
hardware, software
functional, assurance
performance, availability
Question 15.15. (TCO 13) All of the following are obscure reasons why distributed systems are more prevalent now than in the past, expect for which one? (Points : 5)
Improved performance
Increased availability
Greater versatility
Efficient business models
Submitted: 2 years ago.Category: Homework
Show More
Show Less
Ask Your Own Homework Question
Answered in 5 hours by:
2/25/2016
Tutor: HomeworkPete, Engineer replied 2 years ago
HomeworkPete
HomeworkPete, Engineer
Category: Homework
Satisfied Customers: 20,577
Experience: A-Level Math, Chemistry, Biology, Physics, and general topics.
Verified

Hi Jessica,

When do you need these by?

Ask Your Own Homework Question
Customer reply replied 2 years ago

End of day today

Tutor: HomeworkPete, Engineer replied 2 years ago

Ok, I will check if another expert can assist with this...

Ask Your Own Homework Question
Tutor: Mr. Gregory White, Professor replied 2 years ago
Mr. Gregory White
Category: Homework
Satisfied Customers: 5,240
Experience: M.A., M.S. Education / Educational Administration
Verified

This just popped into my system. Still needed or too late at this point? Let me know.

Greg

Ask Your Own Homework Question
Customer reply replied 2 years ago

Too late

Tutor: Mr. Gregory White, Professor replied 2 years ago

So sorry about that - have a great week!

Ask Your Own Homework Question
Was this answer helpful?

How JustAnswer works

step-image
Describe your issueThe assistant will guide you
step-image
Chat 1:1 with a tutorLicensed Experts are available 24/7
step-image
100% satisfaction guaranteeGet all the answers you need
Ask Scott Your Own Question
Scott
Scott
Scott, MIT Graduate
Category: Homework
Satisfied Customers: 3,040
3,040 Satisfied Customers
Experience: MIT Graduate (Math, Programming, Science, and Music)

Scott is online now

A new question is answered every 9 seconds

How JustAnswer works:

  • Ask an ExpertExperts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional AnswerVia email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction GuaranteeRate the answer you receive.

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help.

Mary C.Freshfield, Liverpool, UK

This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!!

AlexLos Angeles, CA

Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult.

GPHesperia, CA

I couldn't be more satisfied! This is the site I will always come to when I need a second opinion.

JustinKernersville, NC

Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around.

EstherWoodstock, NY

Thank you so much for taking your time and knowledge to support my concerns. Not only did you answer my questions, you even took it a step further with replying with more pertinent information I needed to know.

RobinElkton, Maryland

He answered my question promptly and gave me accurate, detailed information. If all of your experts are half as good, you have a great thing going here.

DianeDallas, TX

< Previous | Next >

Meet the Experts:

LogicPro

LogicPro

Engineer

5,894 satisfied customers

Expert in Java C++ C C# VB Javascript Design SQL HTML

Manal Elkhoshkhany

Manal Elkhoshkhany

Tutor

4,556 satisfied customers

More than 5000 online tutoring sessions.

Linda_us

Linda_us

Finance, Accounts & Homework Tutor

3,138 satisfied customers

Post Graduate Diploma in Management (MBA)

Chris M.

Chris M.

M.S.W. Social Work

2,699 satisfied customers

Master's Degree, strong math and writing skills, experience in one-on-one tutoring (college English)

F. Naz

F. Naz

Chartered Accountant

2,194 satisfied customers

Experience with chartered accountancy

Bizhelp

Bizhelp

CPA

1,887 satisfied customers

Bachelors Degree and CPA with Accounting work experience

Seanna

Seanna

Tutor

1,781 satisfied customers

3,000+ satisfied customers, all topics, A+ work

< Previous | Next >

Related Homework Questions
I have a final that I have 3 hours to complete, SEC 360
Question 1. 1. (TCO 1) Which of the following should not be the basis for security policy? (Points : 5) Legislation Corporate directives Corporate needs Vendor documentation Situation awareness reportingQuestion 2. 2. (TCO 2) The IISSCC divides controls into 10 _____, while NIST organizes controls into three _____ and 17 _____. (Points : 5) domains, classes, families domains, controls, families domains, families, classesQuestion 3. 3. (TCO 2) What are the pillars of security? (Points : 5) Confidentiality, integrity, and availability Detection, prevention, and recovery People, process, and technology Administration, technology, and operationQuestion 4. 4. (TCO 3) Security management should ensure that policies established for information security distinguish the _____ of assets, organize people by _____, and manage _____ because that is the enemy of security. (Points : 5) people, separation of duties, technology sensitivity, separation of duties, complexity technologies, importance, people taxonomy, separation of duties, complexity labels, accounts, complexityQuestion 5. 5. (TCO 4) "There shall be a way for an individual to correct information in his or her records" is a clause that might be found in a _____. (Points : 5) law code of ethics corporate policy fair information practices statement Any of the aboveQuestion 6. 6. (TCO 5) Evaluation of ideas for security may use _____, which are _____ that are not meant to be _____. (Points : 5) criteria, models, solutions controls, abstractions, solutions solutions, abstractions, models models, abstractions, solutions models, controls, solutionsQuestion 7. 7. (TCO 6) Many believe that the most important physical security control is _____. (Points : 5) closed-circuit television a good security plan an educated workforce certified security staff resourcesQuestion 8. 8. (TCO 7) The security principle that says that each user should have access to exactly the information resources needed to do his/her job--no more and no less--is called _____. (Points : 5) separation of duties need to know least privilege minimal access least common mechanismQuestion 9. 9. (TCO 8) A business impact analysis prioritizes systems for recovery. What are the highest priority systems called? (Points : 5) Mission-critical systems Security Operations Center systems Mission-essential systems Backup and recovery systems Administrative systemsQuestion 10. 10. (TCO 9) Access controls manage the use of _____ by _____ in an information system. (Points : 5) files, people information resources, programs objects, subjects computer time, people computer cycles, applicationsQuestion 11. 11. (TCO 10) Generally, _____ are encrypted using symmetric cryptography and _____ are encrypted using asymmetric cryptography. (Points : 5) data, messages signatures, data channels, data messages, channels messages, informationQuestion 12. 12. (TCO 10) In a given city, there are a group of people who wish to communicate through the use of asymmetric cryptography. They do not wish to work with any type of certificate authority. Given this information, how would this be accomplished? (Points : 5) Internal certificate authority Private extranet Public VPN provider IPSec tunnels Utilize PGPQuestion 13. 13. (TCO 11) A firewall that disconnects an internal network from an external network i… read more
Wiz of All
Wiz of All
Bachelor\u0027s Degree
90 satisfied customers
Worldwide Advertising, Inc. (referred to as “WAI”) has red
Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are currently hiring… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
Installing and Configuring Windows Server Overview Each
Installing and Configuring Windows Server Overview Each student will create a detailed, organized, unified technical solution given the scenario described below. The submission will be in a written fo… read more
Michael Hannigan
Michael Hannigan
Bachelor\u0027s Program
239 satisfied customers
Book:Security+ Guide to Networking Security Fundamentals 2nd
Book:Security+ Guide to Networking Security Fundamentals 2nd Edition Mark Ciampa The model of _____ is mostly found in high-level security government organizations. trusting everyone all of the time t… read more
Mr. Gregory White
Mr. Gregory White
Professor
5,240 satisfied customers
Scenario Worldwide Advertising, Inc. (referred to as “WAI”)
Scenario Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are current… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
Needing help! Networking-I now have less than 1 hour! PLEASE
1. (TCO 5) The _____ is used to temporarily change terminal settings, perform basic tests, and list device-system information. (Points : 5) global configuration mode startup configuration file network… read more
masterJohn
masterJohn
Software engg.
Bachelor\u0027s Degree
44 satisfied customers
Final exam study guide Page 1 Question 1.1. (TCO 1) Security
Final exam study guide Page 1 Question 1.1. (TCO 1) Security policy contains three kinds of rules as policy clauses. What are they? Preventive, detective, and responsive Prohibitive, permissive, and m… read more
Ellen
Ellen
Attorney
Doctoral Degree
649 satisfied customers
Question 1. Why is it important to prepare written policies?
Question 1. Why is it important to prepare written policies? It lets the policies be communicated more easily. This helps to ensure consistency. A policy is part of the corporate culture. It is requir… read more
Chris M.
Chris M.
M.S.W. Social Work
Master's Degree
2,699 satisfied customers
Scenario Worldwide Advertising, Inc. (referred to as “WAI”)
Scenario Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are current… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
For:"LogicPro" 14. While reviewing the security logs for your
For:"LogicPro" 14. While reviewing the security logs for your server, you notice that a user on the Internet has attempted to access one of your internal application servers. Although it appears that … read more
LogicPro
LogicPro
Engineer
Bachelor of Technology
5,894 satisfied customers
I would like to get answers to my study for my final exam:1.
I would like to get answers to my study for my final exam: 1. (TCO 1) One of the most common types of attacks against commercial websites via the Internet is: Buffer overflow Denial of service IP spoo… read more
Chris M.
Chris M.
M.S.W. Social Work
Master's Degree
2,699 satisfied customers
ScenarioWorldwide Advertising, Inc. (referred to as “WAI”)
Scenario Worldwide Advertising, Inc. (referred to as “WAI”) has hired you as an IT consultant for implementing their Windows network infrastructure. WAI is a new advertising firm, and they are current… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
Question 1 During the ____ phase of the system development
Question 1 During the ____ phase of the system development process, potential problems and opportunities are identified and considered in light of the goals of the business. Answer systems design syst… read more
John
John
Software Engineer
509 satisfied customers
I have two networking exams...a midterm and a final that i
I have two networking exams...a midterm and a final that i need completed ASAP. Each are 35 questions....I need them within the next hour...can anyone help me??? Questions are below... Midterm 1. Ques… read more
Mr. Gregory White
Mr. Gregory White
Professor
5,240 satisfied customers
1. (TCO 1) How would you design a wireless network configuration
1. (TCO 1) How would you design a wireless network configuration that requires the sending device to transmit an RTS and receive a CTS before continuing its use of the network? (Points : 5) Use a Linu… read more
Mr. Gregory White
Mr. Gregory White
Professor
5,240 satisfied customers
How cloud computing is transforming business? What are the
How cloud computing is transforming business? What are the benefits of Cloud Computing? What are the key challenges? Conclusions answer should be at least 150 words.… read more
Homework Girl
Homework Girl
Bachelor's Degree
852 satisfied customers
Computer Security Managment 3-4 Pages (NEED ASAP will give
Computer Security Managment: 3-4 Pages (NEED ASAP will give a good tip if can be done quickly) In reviewing the technical controls with the IT management staff, cryptology was often mentioned as the p… read more
Homework Girl
Homework Girl
Bachelor's Degree
852 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Show MoreShow Less

Ask Your Question

x