SOLUTION: DeVry University Mod 4 Vulnerability Scanning Standard & Encryption Standard Paper


View attached explanation and answer. Let me know if you have any questions.Student Name:Date:Part 1: Vulnerability Scanning StandardLocate and read the Vulnerability Scanning Standard in the NIST Cybersecurity FrameworkPolicy Template Guide. Research online for a real-world implementation example of thestandard/policy and compare it with the NIST policy template side by side.Answer the following questions clearly and systemically in this Word document. Make sure toinclude a References section toward the end of the document.1. The Vulnerability Scanning Standard is implemented for which NIST function and subcategories? [5 points]Answer: Detect-Maintaining Detection Processes to provide awareness of anomalous events-Ensuring Anomalies and Events are detected, and their potential impact is understood2. Which organization is the implementation example you identified for? Which industry sector(e.g., education, government, etc.) is the organization in? [5 points]Answer: University of Tennessee and University of Tennessee Foundation MerchantsThe sector is Education[3].3. What is the purpose of the example standard/policy? Which party (parties) does thestandard/policy apply to? Who is/are responsible for implementing this policy? [5 points]Answer: The purpose of the standard is to outline the key role and responsibilities,requirements and notification methods when network scanning is needed by the p…

15 Million Students Helped!

Sign up to view the full answer

WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER AND GET AN AMAZING DISCOUNT