SlideShare a Scribd company logo
1 of 2
CLASS DISCUSSIONS.
Post a detailed response of 200-250 words to each questions
1. Explain the various scans to be performed prior to a security
audit of an IT system? Please provide 6 different examples and
explain how the scanning tools are used.
2. Explain the purpose for establishing system baselines and
how often should these baselines be updated?
3. Explain in detail the elements which make up the RMF.
Explain when each is utilized.
4. Explain why continuous monitoring is necessary and how
does it relate to situational awareness?
5. Explain why a security plan is necessary and provide details
of when the security plan ought to be updated and reviewed?
6. Explain why change management and change configuration
are vitally important and how would these affect the security
plan?
CLASS DISCUSSIONS.  Post a detailed response of 200-250 wo

More Related Content

More from MargenePurnell14

Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
MargenePurnell14
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
MargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
MargenePurnell14
 
International and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docxInternational and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docx
MargenePurnell14
 
ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use
MargenePurnell14
 

More from MargenePurnell14 (20)

Intro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docxIntro to Quality Management Week 3Air Bag Recall.docx
Intro to Quality Management Week 3Air Bag Recall.docx
 
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docxIntro to Quality Management Week 3Air Bag RecallAssignment.docx
Intro to Quality Management Week 3Air Bag RecallAssignment.docx
 
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docxINTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
INTERVIEW WITH AMERICAN INDIAN COMMUNITY PRACTITIONERSResourcesD.docx
 
Interview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docxInterview Each team member should interview an educator about his.docx
Interview Each team member should interview an educator about his.docx
 
IntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docxIntroductionRisk management is critical to protect organization.docx
IntroductionRisk management is critical to protect organization.docx
 
Interview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docxInterview two different individuals regarding their positions in soc.docx
Interview two different individuals regarding their positions in soc.docx
 
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docxInternet ExerciseVisit the homepage of Microsoft at www.micros.docx
Internet ExerciseVisit the homepage of Microsoft at www.micros.docx
 
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docxInterpersonal Violence Against Women, The Role of Men by Martin Schw.docx
Interpersonal Violence Against Women, The Role of Men by Martin Schw.docx
 
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docxInternet of Vehicles-ProjectIntroduction - what you plan t.docx
Internet of Vehicles-ProjectIntroduction - what you plan t.docx
 
Interview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docxInterview an ELL instructor from a Title I school about how assessme.docx
Interview an ELL instructor from a Title I school about how assessme.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
International Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docxInternational Finance Please respond to the followingBased on.docx
International Finance Please respond to the followingBased on.docx
 
International capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docxInternational capital budgeting analysis and presentationBy the .docx
International capital budgeting analysis and presentationBy the .docx
 
Internet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docxInternet of Things       Word limit1500 - 2000Ma.docx
Internet of Things       Word limit1500 - 2000Ma.docx
 
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docxINTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
INTERNATIONAL HUMAN RESOURCE - CASE DISCUSSION QUESTIONS1.Wh.docx
 
International and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docxInternational and Intercultural Communication After reviewing sect.docx
International and Intercultural Communication After reviewing sect.docx
 
International and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docxInternational and Intercultural CommunicationAfter reviewing secti.docx
International and Intercultural CommunicationAfter reviewing secti.docx
 
Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam Class Introduction to Scientific Computing LIVE inclass exam 
Class Introduction to Scientific Computing LIVE inclass exam 
 
ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use ClarifyQuality of the core concepts using notes  to help Use
ClarifyQuality of the core concepts using notes  to help Use
 
CLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 wordCLASS DISCUSSIONS.  Post a detailed response of 250 word
CLASS DISCUSSIONS.  Post a detailed response of 250 word
 

CLASS DISCUSSIONS.  Post a detailed response of 200-250 wo

  • 1. CLASS DISCUSSIONS. Post a detailed response of 200-250 words to each questions 1. Explain the various scans to be performed prior to a security audit of an IT system? Please provide 6 different examples and explain how the scanning tools are used. 2. Explain the purpose for establishing system baselines and how often should these baselines be updated? 3. Explain in detail the elements which make up the RMF. Explain when each is utilized. 4. Explain why continuous monitoring is necessary and how does it relate to situational awareness? 5. Explain why a security plan is necessary and provide details of when the security plan ought to be updated and reviewed? 6. Explain why change management and change configuration are vitally important and how would these affect the security plan?