Which classification level is the highest level used by the U.S. federal governm
ID: 3891539 • Letter: W
Question
Which classification level is the highest level used by the U.S. federal government?
Confidential
Top Secret
Secret
Private
Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?
Standard
Procedure
Guideline
Policy
What is the first step in a disaster recovery effort?
Communicate with all affected parties.
Ensure that everyone is safe.
Follow the disaster recovery plan (DRP).
Respond to the disaster.
One of the first industries to adopt and widely use mobile applications was the healthcare industry.
True
False
In Mobile IP, what term describes a device that would like to communicate with a mobile node (MN)?
Correspondent node (CN)<br><u> </u>
Home agent (HA)
Care of address (COA)
Foreign agent (FA)
Which one of the following is NOT a market driver for the Internet of Things (IoT)?
Advancements in data analytics
Global adoption of non-IP networking
Growth of cloud computing
Smaller and faster computing
The Children's Online Privacy Protection Act (COPPA) restricts the collection of information online from children. What is the cutoff age for COPPA regulation?
15
11
18
13
Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?
Collaboration
Voice over IP (VoIP)
Audio conferencing
Video conferencing
Which compliance obligation includes security requirements that apply specifically to federal government agencies in the United States?
Gramm-Leach-Bliley Act (GLBA)
Federal Information Security Management Act (FISMA)
Health Insurance Portability and Accountability Act (HIPAA)
Family Educational Rights and Privacy Act (FERPA)
Which term describes any action that could damage an asset?
Vulnerability
Risk
Countermeasure
Threat
From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet of Things (IoT)?
Security risks will increase.
Security risks will decrease.
Security risks will be eliminated.
Security risks will stay the same.
Access control lists (ACLs) are used to permit and deny traffic in an IP router.
True
False
What is NOT a common endpoint for a virtual private network (VPN) connection used for remote network access?
Laptop
Firewall
Router
Content filter
What compliance regulation applies specifically to the educational records maintained by schools about students?
Family Education Rights and Privacy Act (FERPA)
Health Insurance Portability and Accountability Act (HIPAA)
Gramm-Leach-Bliley Act (GLBA)
Federal Information Security Management Act (FISMA)
The recovery point objective (RPO) is the maximum amount of data loss that is acceptable.
True
False
Explanation / Answer
Top secret is the highest level of secrecy used by the U.S. federal government.
Chris is writing a policy document.
The first step in a disaster recovery effort is to ensure that everyone is safe.
One of the first industries to adopt and widely use mobile applications was the healthcare industry. This statement is false.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.