List three of the high-level functions that the EBK specifies for evaluating the network and telecommunication security competency.

What will be an ideal response?

1. Perform a network security evaluation, calculate risks to the enterprise, and recommend remediation activities
2. Ensure that appropriate solutions to eliminate or otherwise mitigate identified vulnerabilities are implemented effectively
3. Assess fulfillment of functional requirements by arranging independent verification and validation of the network
4. Analyze data and report results
5. Ensure that anti-malware systems are operating correctly
6. Compile data into measures for analysis and reporting

Computer Science & Information Technology

You might also like to view...

Distributed computing distributes ________

A) power ability across all users B) disk storage for all computer users C) Internet usage across the entire network D) the processing of tasks across a group of computers

Computer Science & Information Technology

__________ is an encryption method designed for signing and encrypting email, which uses both symmetric and asymmetric encryption

a. Data encryption standard b. Triple data encryption standard c. Pretty good privacy d. None of the above

Computer Science & Information Technology