Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards. a. STIG b. BBP c. Regulation d. Manual
Weegy: To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP on Wireless Security Standards. (More)
Question
Expert Answered
Asked 8/6/2013 9:29:31 AM
0 Answers/Comments
Which is not a disadvantage of symmetric cryptography? a. Speed b. No true means to authenticate the sender c. Breaking one key compromises multiple parties d. Math algorithms are complex and can easily be broken
Weegy: Which is not a disadvantage of symmetric cryptography? b. No true means to authenticate the sender. (More)
Question
Expert Answered
Asked 8/6/2013 9:30:36 AM
0 Answers/Comments
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
18,446,533 questions answered
Popular Conversations
Simplify 12A + 2 + A - 1. 14A - 1 13A - 1 13A + 1 User: ...
Weegy: 12(A - B) = 12A - 12B User: Simplify 10x - 3x + (-5x). -2x 2x 18x -18x Weegy: c.18x User: Simplify ...
11/25/2014 3:05:18 PM| 6 Answers
True or false carbohydrates are made up of carton, hydrogen, and ...
Weegy: The answer is True. Here is the source link: User: The two main types of fiber are?
11/25/2014 7:45:43 PM| 5 Answers
x + y = k x - y = k
Weegy: 8 1/3 - 1 5/6 = 25/3 - 11/6; = 50/6 - 11/6; = 39/6; = 13/2; = 6 1/2 User: 5x + y = 6 5x + 3y = -4 Weegy: ...
11/25/2014 9:09:05 AM| 4 Answers
Determine the solution set of (2x - 5)2 = 11.
Weegy: 2x - 3 = 9 2x = 9 + 3 2x = 12 x = 12/2 x = 6 User: Determine the solution set of (3x + 1)2 - 100 = ...
11/25/2014 11:37:07 AM| 4 Answers
20,000 pounds equals how many English tons?
11/25/2014 3:30:36 AM| 3 Answers
Simplify 20 + (2 + r). r + 22 22r 20r
Weegy: r + 22 User: Simplify (5a)(5b). 10ab 25ab 55ab Weegy: (5a)(5b) = 25ab User: Simplify 7.95 - 3.86 + ...
11/25/2014 8:53:09 AM| 3 Answers
Which personal pronoun best completes the sentence? How is it used? ...
Weegy: My father made my sister and ME blueberry pancakes for breakfast. The correct pronoun is: me; indirect object. ...
11/25/2014 9:42:28 AM| 3 Answers
t Object]User: y + 3 = 2x y + 4 = 3x If you use the comparison ...
Weegy: 31/8 and 25/8 User: What is the result of adding the system of equations? 2x + y = 4 3x - y = 6 x = 2 x = ...
11/25/2014 10:32:36 AM| 3 Answers
Which of the following is the correct factored form of the given ...
Weegy: The correct factored form of the given equation x^2 + 3x - 4 = 0 is (x - 1)(x + 4) = 0. User: olve n3 + 2n2 ...
11/25/2014 11:30:00 AM| 3 Answers
Which of the following is the correct factored form of the given ...
Weegy: (x - 3)^2 = 0 written in general form is: x^2 - 6x + 9 = 0 Expand (x - 3)^2 = x^2 - 3x - 3x + 9 = x^2 - 6x + ...
11/25/2014 11:33:47 AM| 3 Answers
The graph of which of the following will be perpendicular to the ...
Weegy: The graph of which of the following will be perpendicular to the graph of y = 2x ? 4? D. 2x + 4y = 1 User: Two ...
11/25/2014 1:29:11 PM| 3 Answers
Weegy Stuff
S
L
1
L
P
C
1
P
C
1
L
P
C
1
Points 2622 [Total 14332]| Ratings 10| Comments 2522| Invitations 0|Offline
S
L
Points 1435 [Total 3721]| Ratings 0| Comments 1435| Invitations 0|Offline
S
L
Points 777 [Total 1298]| Ratings 6| Comments 717| Invitations 0|Offline
S
1
L
1
L
P
P
L
P
Points 761 [Total 14135]| Ratings 0| Comments 761| Invitations 0|Offline
S
Points 697 [Total 729]| Ratings 1| Comments 687| Invitations 0|Offline
S
1
L
L
Points 273 [Total 6667]| Ratings 0| Comments 273| Invitations 0|Offline
S
L
Points 159 [Total 1455]| Ratings 3| Comments 129| Invitations 0|Offline
S
Points 67 [Total 67]| Ratings 1| Comments 57| Invitations 0|Offline
S
Points 50 [Total 50]| Ratings 0| Comments 0| Invitations 5|Offline
S
Points 46 [Total 46]| Ratings 3| Comments 6| Invitations 1|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2014 Purple Inc.