Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards. a. STIG b. BBP c. Regulation d. Manual
Weegy: To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP on Wireless Security Standards. (More)
Question
Expert Answered
Asked 8/6/2013 9:29:31 AM
0 Answers/Comments
Which is not a disadvantage of symmetric cryptography? a. Speed b. No true means to authenticate the sender c. Breaking one key compromises multiple parties d. Math algorithms are complex and can easily be broken
Weegy: Which is not a disadvantage of symmetric cryptography? b. No true means to authenticate the sender. (More)
Question
Expert Answered
Asked 8/6/2013 9:30:36 AM
0 Answers/Comments
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
19,684,863 questions answered
Popular Conversations
y = –x + 2 for x = {–3, –1, 1, 2, 3}
Weegy: Here are some characteristics of grace and forgiveness: patience, kindness, mercy, unconditional love, empathy, ...
2/25/2015 8:56:53 AM| 4 Answers
Which verb form correctly completes the sentence? The traveling ...
Weegy: The traveling circus CAME to town last weekend.
2/25/2015 12:09:44 PM| 4 Answers
Find the midpoint of the line segment whose endpoints are (7, 5) and ...
Weegy: The midpoint of the line segment whose endpoints are (7, 5) and (7, 11) is (7, 8) User: Find the midpoint ...
2/25/2015 1:05:29 PM| 4 Answers
Evaluate the following expression. 2^-3 User: Simplify (x^4y)^3
Weegy: (x^4y)^3 is equal to x^12y^3. User: Find the product. y^4 · y^3 User: What is the square root of 48 in ...
2/25/2015 10:25:02 AM| 3 Answers
The phase change that is the reverse of sublimation is A. ...
Weegy: Boyle's law states that the volume of a gas is inversely proportional to its pressure if the temperature and the ...
2/26/2015 2:21:23 AM| 3 Answers
whats lush
Weegy: 1+1 = 2 User: whats in a heartbeat
2/26/2015 12:22:58 PM| 3 Answers
A ratio compares two numbers by division. True User: The ratio of ...
Weegy: When ratios are used in comparing units of measure, the units should be the same. User: In writing the ratio ...
2/26/2015 1:31:50 PM| 3 Answers
The People's Republic of China was proclaimed by on October 1, 1949. ...
Weegy: 1949. The exact date is October 1, 1949.
2/25/2015 12:54:19 AM| 2 Answers
What is a centrally planned economy User: What is meant by the ...
Weegy: In economics, the invisible hand of the market is a metaphor conceived by Adam Smith to describe the ...
2/25/2015 7:07:23 AM| 2 Answers
Weegy Stuff
S
1
L
1
L
P
P
L
P
P
P
Points 1053 [Total 16835]| Ratings 0| Comments 1053| Invitations 0|Offline
S
L
P
L
P
P
Points 1030 [Total 7805]| Ratings 0| Comments 1030| Invitations 0|Offline
S
P
C
L
P
L
1
Points 621 [Total 7301]| Ratings 4| Comments 581| Invitations 0|Offline
S
Points 572 [Total 911]| Ratings 5| Comments 522| Invitations 0|Offline
S
1
L
L
Points 409 [Total 7475]| Ratings 1| Comments 399| Invitations 0|Offline
S
Points 197 [Total 342]| Ratings 1| Comments 187| Invitations 0|Offline
S
Points 149 [Total 169]| Ratings 0| Comments 149| Invitations 0|Offline
S
Points 85 [Total 85]| Ratings 0| Comments 85| Invitations 0|Offline
S
Points 47 [Total 47]| Ratings 0| Comments 37| Invitations 1|Offline
S
1
L
1
Points 31 [Total 3441]| Ratings 3| Comments 1| Invitations 0|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2014 Purple Inc.