100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Annex E UPDATED Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
16-08-2024
Written in
2024/2025

Annex E UPDATED Exam Questions and CORRECT Answers The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability. Is the definition of? a. Information Security b. Cyberspace c. Information Operations d. Cyberspace Operations - CORRECT ANSWER- a. Information Security

Show more Read less
Institution
Annex E
Course
Annex E









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Annex E
Course
Annex E

Document information

Uploaded on
August 16, 2024
Number of pages
11
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Annex E UPDATED Exam Questions and
CORRECT Answers
The protection of information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction in order to ensure confidentiality,
integrity, and availability. Is the definition of?


a. Information Security
b. Cyberspace
c. Information Operations
d. Cyberspace Operations - CORRECT ANSWER- a. Information Security


The process of tracking and approving changes to the system.


a. Documentation
b. Media Control
c. Backups
d. Configuration Management - CORRECT ANSWER- d. Configuration Management


A unit policy on "Bring your own device to work" is an example of a:


a. System Specific Policy
b. Program Policy
c. Guideline
d. Issue Specific Policy - CORRECT ANSWER- d. Issue Specific Policy


_____________ are network focused and threat-agnostic while _____________ are threat-
specific and frequently support mission assurance objectives.


a. DCO, OCO
b. DCO, DoDIN Ops

, c. DoDIN Ops, DCO
d. DoDIN Ops, OCO - CORRECT ANSWER- c. DoDIN Ops, DCO


Identifies a set of cybersecurity activities that are required for to protect the DoDIN.


a. JP 3-12
b. DODI 8500.1
c. DODI 8530.01
d. NIST SP 800-12R2 - CORRECT ANSWER- c. DODI 8530.01


5.02 - CORRECT ANSWER- 5.02


Establishes and manages the cybersecurity program within a command, site, system, or
enclave in accordance with DoD, DON, and Marine Corps cybersecurity guidance and
policies


a. System Administrator
b. Network Administrator
c. Information System Security Manager
d. Information System Security Officer - CORRECT ANSWER- c. Information System
Security Manager


A common security strategy used to provide a protective multilayer barrier against various
forms of attack.


a. Access Control
b. Packet Filtering
c. Vulnerability Scan
d. Defense-in-Depth - CORRECT ANSWER- d. Defense-in-Depth


Any vulnerability, the exploitation of which will directly and immediately result in loss of
Confidentiality, Availability, or Integrity.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1101
Member since
1 year
Number of followers
102
Documents
68972
Last sold
8 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

176 reviews

5
75
4
31
3
47
2
8
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions