CIS 349 (CIS 349)

Strayer University

Here are the best resources to pass CIS 349 (CIS 349). Find CIS 349 (CIS 349) study guides, notes, assignments, and much more.

Page 2 out of 15 results

Sort by

CIS 349 Final Exam - Questions and Answers, Graded A
  • CIS 349 Final Exam - Questions and Answers, Graded A

  • Exam (elaborations) • 7 pages • 2021
  • CIS 349 Final Exam 1. Many organizations use a RACI matrix to document tasks and the personnel responsible for the assignments. RACI stands for ___________, ___________, consulted, and informed. 2. Regarding user security clearances, in addition to possessing a clearance level that matches or exceeds the classification label of an object, a subject must have the ___________ for the object as well. 3. Company A has a project plan for a new product under development. The product will be ...
    (0)
  • $20.49
  • + learn more
CIS 349 Midterm Exam - 100% Correct Questions and Answers
  • CIS 349 Midterm Exam - 100% Correct Questions and Answers

  • Exam (elaborations) • 7 pages • 2021
  • CIS 349 Week 5 Midterm Exam 1. This is an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker. 2. ________ seeks to better run an organization using complete and accurate information and management processes or controls. 3. What term is given to the practice of mitigating risks through controls? 4. What is the Public Company Accounting Oversight Board (PCAOB)? 5. What is the name of the process, b...
    (0)
  • $16.99
  • + learn more
Strayer University:CIS 349 Week 8 Assignment 4, Designing Compliance Within the LAN to WAN Domain|COMPLETED|
  • Strayer University:CIS 349 Week 8 Assignment 4, Designing Compliance Within the LAN to WAN Domain|COMPLETED|

  • Essay • 7 pages • 2020
  • CIS 349 Assignment 4: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas: Pr...
    (0)
  • $10.98
  • 2x sold
  • + learn more
Strayer University:CIS 349 Week 7 Worksheet 4, LAN-WAN Compliance and Auditing|COMPLETE WORK|
  • Strayer University:CIS 349 Week 7 Worksheet 4, LAN-WAN Compliance and Auditing|COMPLETE WORK|

  • Essay • 6 pages • 2020
  • CIS 349 Week 7 Worksheet 4: LAN/WAN Compliance and Auditing Course Learning Outcome(s) Analyze information security systems compliance requirements within the Workstation and LAN Domains. Design and implement ISS compliance within the LAN-to-WAN and WAN domains with an appropriate framework.
    (0)
  • $10.98
  • + learn more
Strayer University:CIS 349 Week 6 Assignment 3, Evaluating Access Control Methods|COMPLETED|
  • Strayer University:CIS 349 Week 6 Assignment 3, Evaluating Access Control Methods|COMPLETED|

  • Essay • 6 pages • 2020
  • CIS 349 Assignment 3: Evaluating Access Control Methods Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (R...
    (0)
  • $9.98
  • + learn more