subject

QUESTION 1 What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks? a. least functionality b. whitelisting c. function limiting d. blacklisting 10 points QUESTION 2 Which application development life-cycle model uses a sequential design process? a. waterfall b. agile c. serial d. linear 10 points QUESTION 3 What type of video surveillance is typically used by banks, casinos, airports, and military installations, and commonly employs guards who actively monitor the surveillance? a. ITV b. IPTV c. CCTV d. ICTV 10 points QUESTION 4 What U. S. government classified standard is intended to prevent attackers from picking up electromagnetic fields from government buildings? a. TEMPEST b. RAIN c. MaSec d. EMIF 10 points QUESTION 5 How can an area be made secure from a non-secured area via two interlocking doors to a small room? a. Using a mantrap b. Using a closet c. Using a pit d. Using a lockout 10 points QUESTION 6 What publicly released software security update is intended to repair a vulnerability? a.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 09:00
The first screen you see when you open word2016 what is called?
Answers: 1
question
Computers and Technology, 23.06.2019 14:00
Select the correct answer. andre was recently hired by an organization to check for system vulnerabilities. he is supposed to exploit these vulnerabilities and create a report on the extent of damage to which the system was susceptible. what position does andre hold in this organization? a. information security analyst b. information assurance manager c. penetration tester d. network security engineer e. chief information security officer
Answers: 2
question
Computers and Technology, 23.06.2019 15:00
Idon’t understand the double8 coding problem. it is java
Answers: 1
question
Computers and Technology, 24.06.2019 17:40
Write a program that begins by reading in a series of positive integers on a single line of input and then computes and prints the product of those integers. integers are accepted and multiplied until the user enters an integer less than 1. this final number is not part of the product. then, the program prints the product. if the first entered number is negative or 0, the program must print “bad input.” and terminate immediately
Answers: 2
You know the right answer?
QUESTION 1 What security concept states a user should only be given the minimum set of permissions r...
Questions
question
Mathematics, 15.04.2021 04:50
question
Mathematics, 15.04.2021 04:50
question
Chemistry, 15.04.2021 04:50
question
Physics, 15.04.2021 04:50