Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which classification level is the highest level used by the U.S. federal governm

ID: 3891539 • Letter: W

Question

Which classification level is the highest level used by the U.S. federal government?

              Confidential

              Top Secret

              Secret

              Private

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?

              Standard

              Procedure

              Guideline

              Policy

What is the first step in a disaster recovery effort?

              Communicate with all affected parties.

              Ensure that everyone is safe.

              Follow the disaster recovery plan (DRP).

              Respond to the disaster.

One of the first industries to adopt and widely use mobile applications was the healthcare industry.

              True

              False

In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?

              Correspondent node (CN)<br><u>&nbsp;</u>

              Home agent (HA)

              Care of address (COA)

              Foreign agent (FA)

Which one of the following is NOT a market driver for the Internet of Things (IoT)?

              Advancements in data analytics

              Global adoption of non-IP networking

              Growth of cloud computing

              Smaller and faster computing

The Children's Online Privacy Protection Act (COPPA) restricts the collection of information online from children. What is the cutoff age for COPPA regulation?

              15

              11

              18

              13

Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?

              Collaboration

              Voice over IP (VoIP)

              Audio conferencing

              Video conferencing

Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?

              Gramm-Leach-Bliley Act (GLBA)

              Federal Information Security Management Act (FISMA)

              Health Insurance Portability and Accountability Act (HIPAA)

              Family Educational Rights and Privacy Act (FERPA)

Which term describes any action that could damage an asset?

              Vulnerability

              Risk

              Countermeasure

              Threat

From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?

              Security risks will increase.

              Security risks will decrease.

              Security risks will be eliminated.

              Security risks will stay the same.

Access control lists (ACLs) are used to permit and deny traffic in an IP router.

              True

              False

What is NOT a common endpoint for a virtual private network (VPN) connection used for remote network access?

              Laptop

              Firewall

              Router

              Content filter

What compliance regulation applies specifically to the educational records maintained by schools about students?

              Family Education Rights and Privacy Act (FERPA)

              Health Insurance Portability and Accountability Act (HIPAA)

              Gramm-Leach-Bliley Act (GLBA)

              Federal Information Security Management Act (FISMA)

The recovery point objective (RPO) is the maximum amount of data loss that is acceptable.

              True

              False

Explanation / Answer

Top secret is the highest level of secrecy used by the U.S. federal government.

Chris is writing a policy document.

The first step in a disaster recovery effort is to ensure that everyone is safe.

One of the first industries to adopt and widely use mobile applications was the healthcare industry. This statement is false.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote