What is the name of this Standard?

A new U.S. Federal Information Processing Standard specifies a cryptographic algorithm. This algorithm is used by U.S. government organizations to protectsensitive, but unclassified, information. What is the name of this Standard? A. Triple DES B. Blowfish C. AES D. CAST E. RSA Explanation: Show Answer

Read More

Which of the following is likely in a small-business environment?

Which of the following is likely in a small-business environment? A. Most small businesses employ a full-time information-technology staff. B. Resources are available as needed. C. Small businesses have security personnel on staff. D. Most employees have experience with information security. E. Security budgets are very small. Explanation: Show Answer

Read More

When attempting to identify OPSEC indicators, information-security professionals must:

When attempting to identify OPSEC indicators, information-security professionals must: (Choose THREE.) A. Discover the information daily activities yield. B. Meet with adversaries. C. Perform business impact analysis surveys. D. Scrutinize their organizations’ daily activities. E. Analyze indicators, to determine the information an adversary can glean both from routine and nonroutine activities. Explanation: Show Answer

Read More

Why should each system user and administrator have individual accounts?

Why should each system user and administrator have individual accounts? (Choose TWO.) A. Using generic user names and passwords increases system security and reliability. B. Using separate accounts for each user reduces resource consumption, particularly disk space. C. By using individual login names and passwords, user actions can be traced. D. If users do not […]

Read More

Which of the following best describes an external intrusion attempt on a local-area network (LAN)?

Which of the following best describes an external intrusion attempt on a local-area network (LAN)? A. Internal users try to gain unauthorized access to information assets outside the organizational perimeter. B. External-intrusion attempts from sources outside the LAN are not granted permissions or rights to an organization’s information assets C. External users attempt to access […]

Read More