List three of the high-level functions that the EBK specifies for evaluating the network and telecommunication security competency.

What will be an ideal response?


1. Perform a network security evaluation, calculate risks to the enterprise, and recommend remediation activities
2. Ensure that appropriate solutions to eliminate or otherwise mitigate identified vulnerabilities are implemented effectively
3. Assess fulfillment of functional requirements by arranging independent verification and validation of the network
4. Analyze data and report results
5. Ensure that anti-malware systems are operating correctly
6. Compile data into measures for analysis and reporting

Computer Science & Information Technology

You might also like to view...

Describe the difficulties that may arise when building a system from its components. What particular problems might occur when a system is built on a host computer for some target machine?

What will be an ideal response?

Computer Science & Information Technology

Hardware write blockers have the advantage of having been vetted more often in legal cases.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following multiple word variable names does not conform to the good programming practices in the text?

a) multiple_word_variable_name b) multipleWordVariableName c) multiplewordvariablename d) aReallyReallyLongMultipleWordVa

Computer Science & Information Technology

A user should choose the output medium ________ if they want to create a hard copy of their presentation to mark changes on

A) Screen B) Slide C) Paper D) Overhead sheet

Computer Science & Information Technology