it.476abdullah

This
work is important to me. Solve it correctly, without mistakes, without

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

plagiarism. Follow the instructions. There is no chance to repeat it.

Therefore, you must do a complete and correct work 100%.If you are sure you can do it, accept it put the solve in the cover College of Computing and Informatics
Assignment 2
Deadline: Thursday 30/11/2023 @ 23:59
[Total Mark for this Assignment is 8]
Student Details:
Name:
ID:
CRN:
Instructions:
• You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
• It is your responsibility to check and make sure that you have uploaded both the correct files.
• Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets, convert text into image or languages other than English
or any kind of manipulation).
• Email submission will not be accepted.
• You are advised to make your work clear and well-presented. This includes filling your information on the
cover page.
• You must use this template, failing which will result in zero mark.
• You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
• Late submission will result in ZERO mark.
• The work should be your own, copying from students or other resources will result in ZERO mark.
• Use Times New Roman font for all your answers.
Question One
Pg. 01
Learning
Outcome(s):
Analyze problems
related to the field
of Security and
Information
Assurance
Question One
Discuss the employee lifecycle stages, and give example for each?
3 Marks
Question Two
Pg. 02
Learning
Outcome(s):
Analyze problems
related to the field
of Security and
Information
Assurance
Apply the most
appropriate
solutions to
problems related
to the field of
Security and
Information
Assurance.
1.5 Marks
Question Two
What is the best, when the company Posting Job, is to have one versions of a job
description or two versions of a job description? And why?
Question Three
Pg. 03
Learning
Outcome(s):
Apply effective,
proper, and stateof-the-art security
tools and
technologies.
1.5 Marks
Question Three
Explain, how layered defense model is helping securing facility?
Question Four
Pg. 04
Learning
Outcome(s):
Demonstrate
processes to
implement and
enforce policy
Develop security
policies and put in
place an effective
security
architecture that
comprises
modern hardware
and software
technologies and
protocols
2 Marks
Question Four
What is Data Destruction? And what is the benefit of physical destruction? Give two
examples of using physical destruction?

Still stressed with your coursework?
Get quality coursework help from an expert!