Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Ok, I understand!
Your school or university
Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Here are the best resources to pass CIS 349 (CIS 349). Find CIS 349 (CIS 349) study guides, notes, assignments, and much more.
Page 2 out of
14 results
Sort by
CIS 349 Midterm Exam - 100% Correct Questions and Answers
Exam (elaborations) • 7
pages
• 2021
CIS 349 Week 5 Midterm Exam



1. This is an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker.



2. ________ seeks to better run an organization using complete and accurate information and management processes or controls.



3. What term is given to the practice of mitigating risks through controls?



4. What is the Public Company Accounting Oversight Board (PCAOB)?



5. What is the name of the process, b...
CIS 349 Midterm Exam - 100% Correct Questions and Answers
Last document update:
ago
CIS 349 Week 5 Midterm Exam



1. This is an assessment method that attempts to bypass controls and gain access to a specific system by simulating the actions of a would-be attacker.



2. ________ seeks to better run an organization using complete and accurate information and management processes or controls.



3. What term is given to the practice of mitigating risks through controls?



4. What is the Public Company Accounting Oversight Board (PCAOB)?



5. What is the name of the process, b...
Strayer University:CIS 349 Week 8 Assignment 4, Designing Compliance Within the LAN to WAN Domain|COMPLETED|
Essay • 7
pages
• 2020
CIS 349 Assignment 4: Designing Compliance within the LAN-to-WAN Domain

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

Pr...
Strayer University:CIS 349 Week 8 Assignment 4, Designing Compliance Within the LAN to WAN Domain|COMPLETED|
Last document update:
ago
CIS 349 Assignment 4: Designing Compliance within the LAN-to-WAN Domain

Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, Arizona, and California). Due to the highly sensitive data created, stored, and transported by your organization, the CIO is concerned with implementing proper security controls for the LAN-to-WAN domain. Specifically, the CIO is concerned with the following areas:

Pr...
CIS 349 Week 7 Worksheet 4: LAN/WAN Compliance and Auditing

Course Learning Outcome(s)

Analyze information security systems compliance requirements within the Workstation and LAN Domains. 
Design and implement ISS compliance within the LAN-to-WAN and WAN domains with an appropriate framework.
Strayer University:CIS 349 Week 7 Worksheet 4, LAN-WAN Compliance and Auditing|COMPLETE WORK|
Last document update:
ago
CIS 349 Week 7 Worksheet 4: LAN/WAN Compliance and Auditing

Course Learning Outcome(s)

Analyze information security systems compliance requirements within the Workstation and LAN Domains. 
Design and implement ISS compliance within the LAN-to-WAN and WAN domains with an appropriate framework.
CIS 349 Assignment 3: Evaluating Access Control Methods

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (R...
Strayer University:CIS 349 Week 6 Assignment 3, Evaluating Access Control Methods|COMPLETED|
Last document update:
ago
CIS 349 Assignment 3: Evaluating Access Control Methods

Imagine that you are the Information Systems Security Specialist for a medium-sized federal government contractor. The Chief Security Officer (CSO) is worried that the organization's current methods of access control are no longer sufficient. In order to evaluate the different methods of access control, the CSO requested that you research: mandatory access control (MAC), discretionary access control (DAC), and role-based access control (R...