Question and answer
Question not found
Ask a question
Not a good answer? Get an answer now. (Free)
New answers
Rating

There are no new answers.

Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level _______. a. 1 b. 2 c. 3 d. 4
Question
Updated 8/6/2013 9:31:58 AM
1 Answer/Comment
A system that handles information that is necessary for the conduct of day-to-day business, but does not materially affect support to deployed or contingency forces in the short-term, would be categorized as MAC level 3.
Added 8/6/2013 9:31:58 AM
To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards. a. STIG b. BBP c. Regulation d. Manual
Weegy: To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP on Wireless Security Standards. (More)
Question
Expert Answered
Asked 8/6/2013 9:29:31 AM
0 Answers/Comments
Which is not a disadvantage of symmetric cryptography? a. Speed b. No true means to authenticate the sender c. Breaking one key compromises multiple parties d. Math algorithms are complex and can easily be broken
Weegy: Which is not a disadvantage of symmetric cryptography? b. No true means to authenticate the sender. (More)
Question
Expert Answered
Asked 8/6/2013 9:30:36 AM
0 Answers/Comments
The ________________________ is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconneciton controls and approvals. a. Integrity level b. Confidentiality level c. Availability level d. Access level User: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, ...
Weegy: b. Program or System Managers User: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software. a. Hardware b. Harddrive c. Network d. Host Weegy: Answer: The Symantec Endpoint Protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a host based intrusion detection/prevention software. [ ] User: Another term for an ICV is? a. Plain text b. Null text c. Hash d. Asymmetric encryption Weegy: Another term for an ICV is hash, letter C. User: The Common Access Card is an example of: a. Authentication based on something you know b. Authentication based on something you have c. Authentication based on something you are d. Multifactor Authentication User: Which of the following does not constitute mandatory changing of a cipher lock combination? a. Someone with the secret has been transferred to another command b. Someone from a different branch of service has a need to know c. The cipher lock is put into service d. The cipher lock is taken out of service (More)
Question
Not Answered
Updated 8/6/2013 10:07:20 AM
1 Answer/Comment
The CONFIDENTIALITY LEVEL is primarily used to establish acceptable methods for individual security clearances, background investigations, access approvals, need-to-share determinations, and interconnection controls and approvals.
Added 8/6/2013 10:07:20 AM
17,413,119 questions answered
Popular Conversations
All of the following physical reactions occur when our ...
Weegy: What are your choices? User: A. dilating pupils B. increasing heartbeat C. increasing digestion D. increasing ...
9/17/2014 12:53:07 AM| 5 Answers
Which of the following areas would most likely have the deepest layer ...
Weegy: Which of the following areas would most likely have the deepest layer of topsoil? b. beach User: Which layer ...
9/17/2014 1:00:32 AM| 4 Answers
Is the underlined word a predicate nominative or a predicate ...
Weegy: "The workers remained calm during the fire drill." In this sentence the word "calm" is the predicate adjective. ...
9/17/2014 2:01:58 PM| 3 Answers
. Command is: A. Assumed by the individual who is the highest ranking ...
Weegy: Command is Directing, ordering, or controlling by virtue of explicit statutory, regulatory, or delegated ...
9/17/2014 1:35:53 AM| 2 Answers
When communicating, ICS requires the use of
Weegy: The Incident Command System (ICS) is "a systematic tool used for the command, control, and coordination of ...
9/17/2014 1:36:41 AM| 2 Answers
chevorlet
Weegy: Find which Chevy van and you will find what the mpg is. User: chevy silverado
9/17/2014 3:00:05 PM| 2 Answers
What court case upheld the use of implied powers by Congress in any ...
Weegy: The implied powers doctrine, upheld in McCulloch v. Maryland, gives Congress the power to create a national bank ...
9/17/2014 2:06:27 PM| 2 Answers
In "Paul's Case," the story suggests that Paul's "dark corner" ...
Weegy: In "Paul's Case," the story suggests that Paul's "dark corner" represents his? contempt for authorityWrong the ...
9/17/2014 1:43:59 PM| 2 Answers
The biggest cause of foodborne illness is
Weegy: Foodborne illness (also foodborne disease and colloquially referred to as food poisoning)[1] is any illness ...
9/17/2014 4:32:41 PM| 2 Answers
The Three-Fifths Compromise dealt with the issue ...
Weegy: The Three-Fifths Compromise dealt with the issue of taxation. User: The convention decided to make a ...
9/17/2014 4:38:35 PM| 2 Answers
Weegy Stuff
S
R
L
1
1
P
C
1
P
1
1
L
P
C
P
C
1
P
C
L
P
C
1
P
C
P
C
P
C
L
Points 1919 [Total 26318]| Ratings 4| Comments 1879| Invitations 0|Offline
S
L
1
L
P
C
1
Points 1757 [Total 8288]| Ratings 8| Comments 1677| Invitations 0|Online
S
L
1
1
1
1
L
1
L
Points 1377 [Total 11157]| Ratings 0| Comments 1377| Invitations 0|Offline
S
L
C
P
C
1
L
L
P
C
1
Points 1334 [Total 17273]| Ratings 10| Comments 1234| Invitations 0|Offline
S
L
P
C
L
P
C
P
C
L
P
C
P
C
P
C
Points 1318 [Total 18490]| Ratings 3| Comments 1288| Invitations 0|Offline
S
1
L
1
L
P
P
L
Points 512 [Total 11758]| Ratings 0| Comments 512| Invitations 0|Offline
S
L
P
C
P
C
1
L
P
C
L
P
C
P
C
P
C
P
C
Points 503 [Total 19034]| Ratings 0| Comments 503| Invitations 0|Offline
S
L
Points 440 [Total 1110]| Ratings 0| Comments 440| Invitations 0|Offline
S
1
L
L
Points 396 [Total 5520]| Ratings 4| Comments 356| Invitations 0|Offline
S
P
C
L
P
L
1
Points 45 [Total 6102]| Ratings 1| Comments 35| Invitations 0|Offline
Home | Contact | Blog | About | Terms | Privacy | Social | ©2014 Purple Inc.