Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards. a. STIG b. BBP c. Regulation d. Manual
Weegy: To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP on Wireless Security Standards. (More)
Question
Expert Answered
Asked 8/6/2013 9:29:31 AM
0 Answers/Comments
Which is not a disadvantage of symmetric cryptography? a. Speed b. No true means to authenticate the sender c. Breaking one key compromises multiple parties d. Math algorithms are complex and can easily be broken
Weegy: Which is not a disadvantage of symmetric cryptography? b. No true means to authenticate the sender. (More)
Question
Expert Answered
Asked 8/6/2013 9:30:36 AM
0 Answers/Comments
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
20,611,095 questions answered
Popular Conversations
Find the product. (0.5n^5)2(10n^7)3
Weegy: (0.5n^5)^2(10n^7)^3 = 0.25n^10*1000n^21 = 250n^31 User: Find the product. (y 2)5 · y 8 User: Find the ...
4/27/2015 10:47:32 AM| 4 Answers
Red Herring
Weegy: A red herring in a story is a literary device where the author deliberately leads readers or characters towards ...
4/27/2015 10:06:37 PM| 4 Answers
Find the quotient. (4ab - 8a^2 + 12ac) ÷ (4a)
Weegy: (4ab - 8a 2 + 12ac)/(4a) = [(4a)(b - 2a + 3c)]/(4a) = -2a + b + 3c User: Find the sum and choose the correct ...
4/27/2015 10:32:59 AM| 3 Answers
What is shutter speed?
4/27/2015 11:20:00 AM| 3 Answers
Identify this conic section x 2 - y 2 = 16
Weegy: There is an term AND a term. Hence, NOT a parabola. The coefficient on the term is different than the ...
4/27/2015 7:22:54 PM| 3 Answers
Atoms contain charged particles called protons and electrons. Each ...
Weegy: All atoms of the same element have the same number of protons. User: Find the quotient –88 ¸ 11. A. ...
4/27/2015 7:34:21 AM| 2 Answers
Which civilization built Machu ...
4/27/2015 8:47:37 AM| 2 Answers
Solve for w in P = 2w + 2l, if P = 38 and l = 12 User: Solve for m ...
Weegy: 33.333333 repeater User: Solve for b 2 in A =1/2 h(b 1+b 2), if A = 16, h = 4, and b 1 = 3. Weegy: h = 2a / ...
4/27/2015 9:40:33 AM| 2 Answers
Find the product. 8y 3(-3y 2) User: Find the product. -7(-a 2)(-b ...
Weegy: question? User: (k 3)5 Weegy: question? User: Find the product. (102)3 User: Simplify. (fg)9
4/27/2015 10:38:23 AM| 2 Answers
Weegy Stuff
S
L
Points 712 [Total 2289]| Ratings 1| Comments 702| Invitations 0|Offline
S
L
Points 633 [Total 1200]| Ratings 2| Comments 613| Invitations 0|Offline
S
P
C
L
P
L
1
P
P
1
Points 535 [Total 8412]| Ratings 3| Comments 505| Invitations 0|Online
S
Points 483 [Total 483]| Ratings 1| Comments 473| Invitations 0|Offline
S
Points 282 [Total 282]| Ratings 2| Comments 262| Invitations 0|Offline
S
Points 266 [Total 266]| Ratings 2| Comments 246| Invitations 0|Offline
S
1
L
L
Points 189 [Total 8183]| Ratings 0| Comments 189| Invitations 0|Offline
S
L
1
R
Points 139 [Total 1211]| Ratings 2| Comments 119| Invitations 0|Offline
S
L
Points 125 [Total 3728]| Ratings 0| Comments 125| Invitations 0|Offline
S
1
L
1
Points 43 [Total 3484]| Ratings 1| Comments 33| Invitations 0|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2015 Purple Inc.