WITH DETAILED VERIFIED AND 100% ACCURATE
ANSWERS BRAND NEW EXAM ALREADY GRADED A+ PASS
A MAC address uses which of the following formats?
Ans✓✓✓Hexadecimal
Which of the following is a hardware identification number that
uniquely identifies a device? Ans✓✓✓MAC address
Which of the following means the loss of CIA could be expected to have
a limited adverse effect on organizational operations, organizational
assets, or individuals? Ans✓✓✓Low potential impact
Which of the following classification levels for national security
information refers to any information or material the unauthorized
disclosure of which reasonably could be expected to cause serious
damage to the national security? Ans✓✓✓Secret
Which of the following refers to programs or code that provide the
interface between the hardware, the users, and the data?
Ans✓✓✓Software assets
Why shouldn't information about specific systems be included in a job
description? Ans✓✓✓To protect against social engineering and other
attacks
, Which of the following is part of the user provisioning phase of the
employee life cycle? Ans✓✓✓The employee is provided with a
username or smart card.
Which of the following NIST publications is known as The NIST
Handbook? Ans✓✓✓SP 800-12
A confidentiality agreement for employees, contractors, and outsourcers
is also known as which of the following? Ans✓✓✓Non-disclosure
agreement
During what stage of the employee life cycle are user accounts disabled?
Ans✓✓✓Termination
Which of the following is not one of the responsibilities of a data owner?
Ans✓✓✓Implementing security controls for the asset
Which of the following best described the Bell-Lapadula security
model? Ans✓✓✓No read up, no write down
Which data type protected by DLP includes patent applications, product
design documents, the source code of the software, research information,
and customer data? Ans✓✓✓Intellectual Property (IP)