Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C845 - Information Systems Security Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
51
Cijfer
A+
Geüpload op
21-01-2026
Geschreven in
2025/2026

C845 - Information Systems Security

Instelling
WGU C845
Vak
WGU C845

Voorbeeld van de inhoud

C845 - Information Systems Security

A NON-REGULATORY agency of the United States Department of COMMERCE that
offers an incredible variety of standards - answer A non-regulatory agency of the United
States Department of Commerce that offers an incredible variety of standards

Internet Engineering Task Force (IETF) - answer Develops and promotes INTERNET
standards that may be voluntarily adopted throughout the industry.

At one time supported by the federal government, it now performs a standards
development function under the Internet Society

Institute of Electrical and Electronics Engineers (IEEE) - answer Professional
organization for the advancement of computer engineering and computer science,
among other aspects of electronics and communications. As one of the leading
standards organizations, it is responsible for the 802 group of standards

American National Standards Institute (ANSI) - answerA NONPROFIT ORGANIZATION
that oversees the development of STANDARDS that are approved by consensus and
are applied on a voluntary basis across a given industry.

Manages and maintains the ASCII standard

World Wide Web Consortium (W3C) - answerStandards organization in which
members, staff, and the public collaborate to develop web standards. The web
technologies include the recommended implementation of Cascading Style Sheets and
XHTML, among many other recommendations

International Organization for Standardization (ISO) - answerA true standards
organization. It tests various products and provides its seal of approval once they pass
rigorous tests. The organization administers over 13,000 standards across many
industries.

Telecommunications Industry Association (TIA) - answerAccredited by the American
National Standards Institute (ANSI) to develop voluntary, consensus-based industry
standards for a wide variety of information and communication technologies (ICT)
products and currently represents nearly 400 companies

SANS Institute - answerA private company formed in 1989 that provides training to the
cyber security industry

Security Triad - answerConfidentiality
Availability

,Integrity

The Primary Security Categories - answerPrevention
Detection
Recovery

Access Control Steps - answerIdentification
Authentication
Authorization
Accounting
Auditing

Risk - answerA chance of damage or loss based upon the exposure to a potential
hazard or threat.

Threat Vector - answerA path that an attacker might take to take advantage of a
vulnerability and do harm

Prudent Man Concept - answerRefers to actions that may be REASONABLY TAKEN
(or are obvious) to safeguard corporate assets and data

Components of Risk - answerThreat
Vulnerability
Controls

Threat - answerAny incident or action that, if carried out, could cause harm or loss of
data or an asset.

Vulnerabilities - answerWeaknesses that may be penetrated or exploited by an attacker

Controls - answerUsed to reduce the possibility that a threat will exploit a vulnerability

Types of Access Controls - answerPhysical
Administrative
Logical

Due Diligence - answerENSURING that the CONTROLS put into place are functioning
ADEQUATELY.

May also be referred to as ASSUREDNESS.

Due Care - answerThe actions that a PRUDENT and REASONABLE person would
make to protect an organization's assets

Categories of Assets - answerPhysical Resources
Data

,Data - answerContents placed on the company network and storage devices

Concept of Least Privilege - answerRefers to granting the least amount of access rights
and permissions required to perform a task.

The Three As of Accounting - answerAuthentication
Authorization
Accounting

Mandatory Vacation - answerA security technique that allows for the review of
employee activities.

Separation of Duties - answerEnsures that no one person has too much power or
¬control

M of N Requirement - answerRequires a certain number of individuals to agree prior to
action being taken. M represents the minimum number of individuals that must agree on
a course of action. N represents the total number individuals involved.

Two-Man Rule - answerA procedure popular in very high-security locations and
situations. It features two individuals who must agree upon action yet are physically
separated and must therefore take action independent of the other

Types of Security Awareness Education Programs - answerNew Hire Orientation
Mandatory Security Training
Corporate-Wide Security Training
Specialty Security Training

Mitigation - answerThe act of limiting risk

Physical Controls - answerRestrict or prohibit access to the physical components of the
infrastructure; usually independent of computer hardware, software, and communication
systems

Usually the first line of defense

Include doors, locks, and fences.

Logical Controls - answerAny network device or software that protects the network
hardware and digital information assets of the company

These include an access control list (ACL), an intrusion detection system (IDS),
firewalls, routers, virus protection software, and activity logging mechanisms.

, Administrative Controls - answerConsist of policies, directives, regulations, and rules set
up by a company to govern activities taken by individuals or to establish operating
procedures.

These include banners, signs, policies or procedures, directives, rules or regulations,
and documents or log-on screens.

Types of Assets - answerDigital - Data stored on IT systems

Information - Content represented by the digital data

Physical - Tangible things

Assurance Procedures - answerProcedures that ensure that the access control
mechanisms correctly implement the security policy

Defense-in-Depth Strategy - answerRelies on two concepts: discouraging the attack
and slowing the attacker

Subject - answerThe user or entity taking the action or accessing a resource such as a
database; always active

Object - answerThe item or resource being acted upon; always passive

Access Control Lists (ACLs) - answerContain the identity and access authority for every
user (subject)

Compatibility Table - answerA type of ACL; maintains the permissions assigned to the
USER

Authorized Use Policy (AUP) - answerSpecifies how the user must behave when using
the networks, information, and IT products of the company. May be a signed policy in a
new-hire folder as well as a logon screen stating appropriate system use.

False Positive - answerRefers to a condition where an unknown user has been
identified and authenticated and allowed access to a system

False Negative - answerRefers to a condition where a known good user is denied
access to the system

Error Rate - answerThe frequency of false positives and false negatives

Factors of Authentication - answer1. Something You Know
2. Something You Have
3. Something You Are
4. Somewhere You Are

Geschreven voor

Instelling
WGU C845
Vak
WGU C845

Documentinformatie

Geüpload op
21 januari 2026
Aantal pagina's
51
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Resolution Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
308
Lid sinds
3 jaar
Aantal volgers
188
Documenten
16076
Laatst verkocht
6 dagen geleden
NURSING VIEW

In my shop you will find documents, package deals, nursing courses, assigments,flashcards and all revision materials .You are welcome

4.0

61 beoordelingen

5
38
4
4
3
6
2
4
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen