Notice: Payments for answers will end 4/10/2017. Click for more info.
Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
Inherent flaws in system software code are called: a. Logic Bomb b. Vulnerability c. Hazards d. Heuristics
Question
Expert Answered
Updated 74 days ago|2/10/2017 1:33:32 AM
1 Answer/Comment
Inherent flaws in system software code are called: vulnerabilities.

Added 74 days ago|2/10/2017 1:33:31 AM
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Expert Answered
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
27,380,900 questions answered
Weegy Stuff
S
P
Points 114 [Total 765] Ratings 0 Comments 114 Invitations 0 Offline
S
P
P
L
P
P
Points 54 [Total 1722] Ratings 0 Comments 54 Invitations 0 Offline
S
Points 21 [Total 21] Ratings 2 Comments 1 Invitations 0 Offline
S
Points 20 [Total 20] Ratings 2 Comments 0 Invitations 0 Offline
S
Points 3 [Total 14] Ratings 0 Comments 3 Invitations 0 Offline
S
Points 2 [Total 2] Ratings 0 Comments 2 Invitations 0 Offline
S
Points 2 [Total 2] Ratings 0 Comments 2 Invitations 0 Offline
S
Points 2 [Total 2] Ratings 0 Comments 2 Invitations 0 Offline
S
Points 1 [Total 1] Ratings 0 Comments 1 Invitations 0 Offline
S
Points 1 [Total 1] Ratings 0 Comments 1 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.