Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space
Answer option A is incorrect. The Defense Technical Information Center (DTIC) is a repository of
scientific and technical documents for the United States Department of Defense. DTIC serves the
DoD community as the largest central resource for DoD and government-funded scientific, technical,
engineering, and business related information available today. DTIC's documents are available to
DoD personnel and defense contractors, with unclassified documents also available to the public.
DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD
contractors, and potential contractors and other U.S. Government agency personnel and their
contractors. Answer option D is incorrect. The Defense Advanced Research Projects Agency (DARPA)
is an agency of the United States Department of Defense responsible for the development of new
technology for use by the military. DARPA has been responsible for funding the development of
many technologies which have had a major effect on the world, including computer networking, as
well as NLS, which was both the first hypertext system, and an important precursor to the
contemporary ubiquitous graphical user interface. DARPA supplies technological options for the
entire Department, and is designed to be the 'technological engine' for transforming DoD. Answer
option C is incorrect. The Defense-wide Information Assurance Program (DIAP) protects and
supports DoD information, information systems, and information networks, which is important to
the Department and the armed forces throughout the day-to-day operations, and in the time of
crisis.The DIAP uses the OSD method to plan, observe, organize, and incorporate IA activities. The
role of DIAP is to act as a facilitator for program execution by the combatant commanders, Military
Services, and Defense Agencies. The DIAP staff combines functional and programmatic skills for a
comprehensive Defense-wide approach to IA. The DIAP's main objective is to ensure that the DoD's
vital information resources are secured and protected by incorporating IA activities to get a secure
net-centric GIG operation enablement and information supremacy by applying a Defense-in-Depth
methodology that integrates the capabilities of people, operations, and technology to establish a
multi-layer, multidimensional protection.
Jesusa
5 months agoLuther
5 months agoLaine
6 months agoMing
6 months agoJenelle
6 months agoValentin
6 months agoHermila
6 months agoAllene
6 months agoMargret
6 months agoHarley
6 months agoIluminada
6 months agoTony
6 months agoRoslyn
6 months agoHyun
11 months agoRia
11 months agoAshley
11 months agoLaura
9 months agoDonette
10 months agoLindsey
10 months agoIsreal
10 months agoBoris
11 months agoJusta
10 months agoDoug
10 months agoArlene
10 months agoSilvana
11 months agoWalton
12 months agoWai
11 months agoLang
11 months agoEmogene
11 months agoLasandra
11 months agoEna
1 year agoBrendan
10 months agoVirgina
10 months agoRenea
10 months agoAilene
11 months agoPearline
11 months agoCammy
11 months agoAlba
1 year agoTerrilyn
1 year agoYvonne
1 year ago