Homework

Homework Questions? Ask a Tutor for Answers ASAP

Ask an Expert,
Get an Answer ASAP!

QUESTION 1 A(n) _________________ policy are codified as…

Customer Question
QUESTION 1A(n) _________________ policy are...
QUESTION 1A(n) _________________ policy are codified as standards and procedures that are used when configuring or maintaining systems.0.10000 points Save AnswerQUESTION 2In systems analysis and design a(n) __________________ is used to chart process flows, how systems operate, and dependencies.0.10000 points Save AnswerQUESTION 3A vulnerability is an identifiable and specific threat that exploits weaknesses in systems intended to protect assets.TrueFalse0.10000 points Save AnswerQUESTION 4A(n) _______________ is a group of individuals within an organization who are share values and have a common goal of making the organization function to meet its objectives and mission.0.10000 points Save AnswerQUESTION 5Documenting, examining, and assessing an organization’s information technology security posture and the problems it faces is known as ______________________.a.
risk identificationb.
risk controlc.
risk determinationd.
risk management0.10000 points Save AnswerQUESTION 6A(n) ______________________ is undetectable by preconfigured signatures because overtime it changes its shape.0.10000 points Save AnswerQUESTION 7Policies are living documents that must be nurtured, given that they are constantly changing and growing. They must be properly disseminated (distributed, read, understood, and agreed to) and managed.TrueFalse0.10000 points Save AnswerQUESTION 8Often known as the maximum acceptable data loss, a(n) __________________ is a point in time were lost data or systems are able to be recovered following an outage.a.
recovery point objectiveb.
maximum acceptable downtimec.
recovery time objectived.
maximum tolerable downtime0.10000 points Save AnswerQUESTION 9When there is a point of time within a function, application, or system that must be recovered, a(n) _____________________ is used as a basis for developing recovery strategies and whether to enforce those strategies during a situation.a.
recovery time objectiveb.
recovery point objectivec.
maximum acceptable downtimed.
maximum tolerable downtime0.10000 points Save AnswerQUESTION 10Inclusive of all four functional components in contingency planning, a(n) _____________ approach reduces the impact of vulnerability exploitation with preparation and planning.a.
transferalb.
terminationc.
defensed.
mitigation0.10000 points Save AnswerQUESTION 11Often known as avoidance, a(n) ________________ approach prevents vulnerability exploitation by adding safeguards to limit access to assets and removing vulnerabilities.a.
defenseb.
terminationc.
mitigationd.
transferal0.10000 points Save AnswerQUESTION 12A(n) ____________________ threat category involves antiquated infrastructure that leads to untrustworthy and unreliable systems.0.10000 points Save AnswerQUESTION 13Maintaining an organization’s information systems confidentiality, integrity, and availability through vulnerability identification is known as __________________.a.
risk determinationb.
risk managementc.
risk controld.
risk identification0.10000 points SavedQUESTION 14A(n) ______________ approach shifts identified risks to other assets, processes, or organizations and is accomplished by rethinking how services, deployment models, outsourcing, or service contracts are offered or acquired.a.
defenseb.
mitigationc.
transferald.
termination0.10000 points Save AnswerQUESTION 15The disaster recovery plan documents critical business functions that must continue at an organization’s alternate location while it works to recover its primary location.TrueFalse0.10000 points Save AnswerQUESTION 16Information security is the protection of systems and hardware to transmit information and other noncritical elements.TrueFalse0.10000 points Save AnswerQUESTION 17Completion of the weighted tables used in the BIA, information technology personnel is valuable when determining categorical data frequency of occurrence and probability of success because of their ability to compile information that is gathered from the various equipment that they maintain.TrueFalse0.10000 points Save AnswerQUESTION 18Online “hot” servers like domain controllers, database, Web, and e-mail servers frequently have “warm” server or a backup to provide redundant functions that are standing by in a near-online state.TrueFalse0.10000 points Save AnswerQUESTION 19When an organization decides or need an information asset to remain unprotected, the decision is based on ________________ to remove the asset from the risk environment.a
Submitted: 7 months ago.Category: Homework
Show More
Show Less
Ask Your Own Homework Question
Answered in 6 hours by:
1/16/2018
Tutor: F. Naz, Chartered Accountant replied 7 months ago
F. Naz
F. Naz, Chartered Accountant
Category: Homework
Satisfied Customers: 5,492
Experience: Experience with chartered accountancy
Verified
Helle
Please mention your deadline and are these from your test or exam??
Ask Your Own Homework Question
Was this answer helpful?

How JustAnswer works

step-image
Describe your issueThe assistant will guide you
step-image
Chat 1:1 with a tutorLicensed Experts are available 24/7
step-image
100% satisfaction guaranteeGet all the answers you need
Ask Scott Your Own Question
Scott
Scott
Scott, MIT Graduate
Category: Homework
Satisfied Customers: 3,040
3,040 Satisfied Customers
Experience: MIT Graduate (Math, Programming, Science, and Music)

Scott is online now

A new question is answered every 9 seconds

How JustAnswer works:

  • Ask an ExpertExperts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional AnswerVia email, text message, or notification as you wait on our site. Ask follow up questions if you need to.
  • 100% Satisfaction GuaranteeRate the answer you receive.

JustAnswer in the News:

Ask-a-doc Web sites: If you've got a quick question, you can try to get an answer from sites that say they have various specialists on hand to give quick answers... Justanswer.com.
JustAnswer.com...has seen a spike since October in legal questions from readers about layoffs, unemployment and severance.
Web sites like justanswer.com/legal
...leave nothing to chance.
Traffic on JustAnswer rose 14 percent...and had nearly 400,000 page views in 30 days...inquiries related to stress, high blood pressure, drinking and heart pain jumped 33 percent.
Tory Johnson, GMA Workplace Contributor, discusses work-from-home jobs, such as JustAnswer in which verified Experts answer people’s questions.
I will tell you that...the things you have to go through to be an Expert are quite rigorous.

What Customers are Saying:

Wonderful service, prompt, efficient, and accurate. Couldn't have asked for more. I cannot thank you enough for your help.

Mary C.Freshfield, Liverpool, UK

This expert is wonderful. They truly know what they are talking about, and they actually care about you. They really helped put my nerves at ease. Thank you so much!!!!

AlexLos Angeles, CA

Thank you for all your help. It is nice to know that this service is here for people like myself, who need answers fast and are not sure who to consult.

GPHesperia, CA

I couldn't be more satisfied! This is the site I will always come to when I need a second opinion.

JustinKernersville, NC

Just let me say that this encounter has been entirely professional and most helpful. I liked that I could ask additional questions and get answered in a very short turn around.

EstherWoodstock, NY

Thank you so much for taking your time and knowledge to support my concerns. Not only did you answer my questions, you even took it a step further with replying with more pertinent information I needed to know.

RobinElkton, Maryland

He answered my question promptly and gave me accurate, detailed information. If all of your experts are half as good, you have a great thing going here.

DianeDallas, TX

< Previous | Next >

Meet the Experts:

LogicPro

LogicPro

Engineer

5,894 satisfied customers

Expert in Java C++ C C# VB Javascript Design SQL HTML

Manal Elkhoshkhany

Manal Elkhoshkhany

Tutor

4,556 satisfied customers

More than 5000 online tutoring sessions.

Linda_us

Linda_us

Finance, Accounts & Homework Tutor

3,138 satisfied customers

Post Graduate Diploma in Management (MBA)

Chris M.

Chris M.

M.S.W. Social Work

2,699 satisfied customers

Master's Degree, strong math and writing skills, experience in one-on-one tutoring (college English)

F. Naz

F. Naz

Chartered Accountant

5,492 satisfied customers

Experience with chartered accountancy

Bizhelp

Bizhelp

CPA

1,887 satisfied customers

Bachelors Degree and CPA with Accounting work experience

Seanna

Seanna

Tutor

1,781 satisfied customers

3,000+ satisfied customers, all topics, A+ work

< Previous | Next >

Related Homework Questions
I have a final that I have 3 hours to complete, SEC 360
Question 1. 1. (TCO 1) Which of the following should not be the basis for security policy? (Points : 5) Legislation Corporate directives Corporate needs Vendor documentation Situation awareness reportingQuestion 2. 2. (TCO 2) The IISSCC divides controls into 10 _____, while NIST organizes controls into three _____ and 17 _____. (Points : 5) domains, classes, families domains, controls, families domains, families, classesQuestion 3. 3. (TCO 2) What are the pillars of security? (Points : 5) Confidentiality, integrity, and availability Detection, prevention, and recovery People, process, and technology Administration, technology, and operationQuestion 4. 4. (TCO 3) Security management should ensure that policies established for information security distinguish the _____ of assets, organize people by _____, and manage _____ because that is the enemy of security. (Points : 5) people, separation of duties, technology sensitivity, separation of duties, complexity technologies, importance, people taxonomy, separation of duties, complexity labels, accounts, complexityQuestion 5. 5. (TCO 4) "There shall be a way for an individual to correct information in his or her records" is a clause that might be found in a _____. (Points : 5) law code of ethics corporate policy fair information practices statement Any of the aboveQuestion 6. 6. (TCO 5) Evaluation of ideas for security may use _____, which are _____ that are not meant to be _____. (Points : 5) criteria, models, solutions controls, abstractions, solutions solutions, abstractions, models models, abstractions, solutions models, controls, solutionsQuestion 7. 7. (TCO 6) Many believe that the most important physical security control is _____. (Points : 5) closed-circuit television a good security plan an educated workforce certified security staff resourcesQuestion 8. 8. (TCO 7) The security principle that says that each user should have access to exactly the information resources needed to do his/her job--no more and no less--is called _____. (Points : 5) separation of duties need to know least privilege minimal access least common mechanismQuestion 9. 9. (TCO 8) A business impact analysis prioritizes systems for recovery. What are the highest priority systems called? (Points : 5) Mission-critical systems Security Operations Center systems Mission-essential systems Backup and recovery systems Administrative systemsQuestion 10. 10. (TCO 9) Access controls manage the use of _____ by _____ in an information system. (Points : 5) files, people information resources, programs objects, subjects computer time, people computer cycles, applicationsQuestion 11. 11. (TCO 10) Generally, _____ are encrypted using symmetric cryptography and _____ are encrypted using asymmetric cryptography. (Points : 5) data, messages signatures, data channels, data messages, channels messages, informationQuestion 12. 12. (TCO 10) In a given city, there are a group of people who wish to communicate through the use of asymmetric cryptography. They do not wish to work with any type of certificate authority. Given this information, how would this be accomplished? (Points : 5) Internal certificate authority Private extranet Public VPN provider IPSec tunnels Utilize PGPQuestion 13. 13. (TCO 11) A firewall that disconnects an internal network from an external network i… read more
Wiz of All
Wiz of All
Bachelor\u0027s Degree
90 satisfied customers
Question 1 (2 points) Question 1 Unsaved Logging is a proactive
Question 1 (2 points) Question 1 Unsaved Logging is a proactive mechanism to prevent attacks. Question 1 options: True False Save Question 2 (2 points) Question 2 Saved Address Space Randomization is … read more
Mr. Wilson
Mr. Wilson
Teacher
Master\u0027s Degree
200 satisfied customers
If needed need citations for answer under each question 1. Explain
If needed need citations for answer under each question 1. Explain the difference between IDS and IPS technologies and how you would implement them to secure a company's networks. And, explain how the… read more
David L.
David L.
Bachelor\u0027s Degree
6 satisfied customers
Steve Herrod pleaseSuppose you are the IT professional in
Attachment: 2014-08-24_141327_rubric_for_security.docx Steve Herrod please Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mal… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
Book:Security+ Guide to Networking Security Fundamentals 2nd
Book:Security+ Guide to Networking Security Fundamentals 2nd Edition Mark Ciampa The model of _____ is mostly found in high-level security government organizations. trusting everyone all of the time t… read more
Mr. Wilson
Mr. Wilson
Teacher
Master\u0027s Degree
200 satisfied customers
Final exam study guide Page 1 Question 1.1. (TCO 1) Security
Final exam study guide Page 1 Question 1.1. (TCO 1) Security policy contains three kinds of rules as policy clauses. What are they? Preventive, detective, and responsive Prohibitive, permissive, and m… read more
FiveStarLaw
FiveStarLaw
Attorney
Doctoral Degree
477 satisfied customers
Technology Evaluation and Recommendation Instructions
Attachment: 2014-05-03_043805_matrix.docx Individual Project: Technology Evaluation and Recommendation Instructions A new client of your security consulting firm is worried about the potential for dat… read more
David L.
David L.
Bachelor\u0027s Degree
6 satisfied customers
Question 1 During the ____ phase of the system development
Question 1 During the ____ phase of the system development process, potential problems and opportunities are identified and considered in light of the goals of the business. Answer systems design syst… read more
John
John
Software Engineer
509 satisfied customers
Steve Herrod DUE JULY 12,2013 1159PM 1. If an organization
Steve Herrod DUE JULY 12,2013 1159PM 1. If an organization has three information assets to evaluate for risk management purposes as shown in the accompanying data, which vulnerability should be evalua… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
DUE 7/6/2013 1159PM 1A. Discuss the process of identifying
DUE 7/6/2013 1159PM 1A. Discuss the process of identifying potential threats to an information asset. How can potential threats be identified? 1. What is risk management? 2. List and describe the key … read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
Windows Server Deployment Proposal Prepare a proposal to
Windows Server Deployment Proposal Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario. Your proposal will include deployment, security policy, applicat… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
I have two networking exams...a midterm and a final that i
I have two networking exams...a midterm and a final that i need completed ASAP. Each are 35 questions....I need them within the next hour...can anyone help me??? Questions are below... Midterm 1. Ques… read more
Mr. Wilson
Mr. Wilson
Teacher
Master\u0027s Degree
200 satisfied customers
Need Help with a security policy document it is in two parts
Need Help with a security policy document it is in two parts can anyone help? Security Policy Document Project Objectives The purpose of this two-part project is to evaluate the student's ability to a… read more
Steve Herrod
Steve Herrod
Senior Customer Care Engineer
Master\u0027s Degree
882 satisfied customers
looking for assistance with a homework paper..my paper is
looking for assistance with a homework paper.. my paper is on CJS/250 - INTRODUCTION TO SECURITY paper is due Sunday... thank you , Edwin… read more
Sonevar
Sonevar
Master\u0027s Degree
12 satisfied customers
6. The data stored on a computer is often the most valuable
6. The data stored on a computer is often the most valuable component in the system. a. Describe FOUR main areas of risk threatening data. b. Suggest precautions against loss of data c. If data on dis… read more
Wiz of All
Wiz of All
Bachelor\u0027s Degree
90 satisfied customers
Can you take a look at this lab for me. There are basically
Tonight..Can someone take a look at this lab for me. There are basically three things that I need to do: evaluate connection types, design a connectivity infrastructure, and design a change management… read more
Timothy the Teacher
Timothy the Teacher
Master\u0027s Degree
161 satisfied customers
I have 20 mutiple choice question from Contempary auditing
I have 20 mutiple choice question from Contempary auditing class 1 Which one of the following types of services offered by a CPA is not an attest service? a. examination b. review c. performing agreed… read more
atluriram
atluriram
ADVOCATE
Master's Degree
49 satisfied customers
What Type Of Stakeholder Would A Nature Conversation Group
Question 1 (2 points) What type of stakeholder would a nature conversation group be for a paper manufacturing company? a. Supplier b. Competitor c. Employee d. Special interest group e. None of these … read more
Suhaila Rahiman
Suhaila Rahiman
Bachelor's Degree
46 satisfied customers
Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Disclaimer: Information in questions, answers, and other posts on this site ("Posts") comes from individual users, not JustAnswer; JustAnswer is not responsible for Posts. Posts are for general information, are not intended to substitute for informed professional advice (medical, legal, veterinary, financial, etc.), or to establish a professional-client relationship. The site and services are provided "as is" with no warranty or representations by JustAnswer regarding the qualifications of Experts. To see what credentials have been verified by a third-party service, please click on the "Verified" symbol in some Experts' profiles. JustAnswer is not intended or designed for EMERGENCY questions which should be directed immediately by telephone or in-person to qualified professionals.

Show MoreShow Less

Ask Your Question

x