Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards. a. STIG b. BBP c. Regulation d. Manual
Weegy: To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP on Wireless Security Standards. (More)
Question
Expert Answered
Asked 8/6/2013 9:29:31 AM
0 Answers/Comments
Which is not a disadvantage of symmetric cryptography? a. Speed b. No true means to authenticate the sender c. Breaking one key compromises multiple parties d. Math algorithms are complex and can easily be broken
Weegy: Which is not a disadvantage of symmetric cryptography? b. No true means to authenticate the sender. (More)
Question
Expert Answered
Asked 8/6/2013 9:30:36 AM
0 Answers/Comments
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
17,604,795 questions answered
Popular Conversations
The densest ocean water is generally found a. in the surface ...
Weegy: A. in the surface zone User: In which zone is ocean temperature most affected by the weather? a. transition ...
9/30/2014 6:07:25 AM| 3 Answers
The pressure of ocean water increases as depth increases. User: The ...
Weegy: It originates in the Gulf of Mexico and, as the Florida Current, passes through the Straits of Florida and then ...
9/30/2014 6:27:02 AM| 3 Answers
Branches within the ICS organization can be established
Weegy: Branches within the ICS organization can be established geographically or functionally. User: ...
9/30/2014 1:49:22 AM| 2 Answers
For which of the following do credit card companies usually NOT ...
Weegy: Credit card companies usually do not charge a fee for early repayment. User: Bankruptcy filings, charge-offs, ...
9/30/2014 6:27:07 AM| 2 Answers
Fill in the blanks to write the following equation as a algebraic ...
Weegy: 6 - 5n = 37 -5n + 6 = 37 -5n = 37 - 6 -5n = 31 -5n/5 = 31/-5 n = -31/5 User: A car travels at 75 ...
9/30/2014 8:15:44 AM| 2 Answers
Locate the participle and the word it modifies. The essay, written ...
Weegy: surprisingly, the essay User: Locate the complete adjective phrase and the noun modified. He found one pearl ...
9/30/2014 10:13:28 AM| 2 Answers
the shininess of a material
9/30/2014 11:36:41 AM| 2 Answers
What two minerals can be identified by taste?
9/30/2014 11:38:46 AM| 2 Answers
Weegy Stuff
S
R
L
1
1
P
C
1
P
1
1
L
P
C
P
C
1
P
C
L
P
C
1
P
C
P
C
P
C
L
Points 3316 [Total 27714]| Ratings 8| Comments 3236| Invitations 0|Offline
S
L
1
L
P
C
1
Points 2951 [Total 9482]| Ratings 12| Comments 2831| Invitations 0|Offline
S
L
P
C
L
P
C
P
C
L
P
C
P
C
P
C
Points 2829 [Total 20001]| Ratings 12| Comments 2709| Invitations 0|Offline
S
L
C
P
C
1
L
L
P
C
1
Points 2761 [Total 18700]| Ratings 19| Comments 2571| Invitations 0|Offline
S
L
1
1
1
1
L
1
L
Points 2595 [Total 12375]| Ratings 0| Comments 2595| Invitations 0|Offline
S
1
L
1
L
P
P
L
Points 983 [Total 12229]| Ratings 0| Comments 983| Invitations 0|Offline
S
L
P
C
P
C
1
L
P
C
L
P
C
P
C
P
C
P
C
Points 864 [Total 19395]| Ratings 2| Comments 844| Invitations 0|Offline
S
L
Points 733 [Total 1402]| Ratings 0| Comments 733| Invitations 0|Offline
S
1
L
L
Points 671 [Total 5794]| Ratings 5| Comments 621| Invitations 0|Online
S
P
C
L
P
L
1
Points 177 [Total 6234]| Ratings 2| Comments 157| Invitations 0|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2014 Purple Inc.