Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

information security

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
01-04-2022
Written in
2022/2023

information security

Institution
Course

Content preview

WGU C724 Information Systems
Management Unit 7 Test

False Correct answer- [True/False] Information is a valuable asset and not everyone in
the world can be trusted with it. Therefore, we need to protect our valuable information
from those with poor intentions. The protection of our information assets is a discipline
known as data security.

a.) True
b.) False

Black Hat Correct answer- Organizations are constantly encountering cyber-attacks
from intruders. For instance, in late 2013, the security system of Target Stores, Inc.,
was compromised by which of the following type of attacker?

a.) Grey Hat
b.) Black Hat
c.) White Hat

Phishing Correct answer- Criminals use which method to send legitimate-looking emails
to innocent victims, which direct them to a Website where they are asked to input
personal information such as user logon and password?

a.) Identity theft
b.) Pharming
c.) Social engineering
d.) Phishing

Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999 Correct
answer- Organizations must follow procedures to store or transfer their financial
information as outlined in which of the following legislation?

a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of
2002

b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996

c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999

Auditing can only be used by the accounting department Correct answer- Security
policies are output from an organization's risk assessment process, which cover an

, organization's need for various levels of security. Auditing is an example of a security
policies control. Which of the following is FALSE regarding auditing?

a.) Auditing is used by many divisions and departments within an organization

b.) Auditing can only be used by the accounting department

c.) An IS auditor may penetrate security policies to determine their adequacy or need for
training

False Correct answer- [True/False] The process of turning information into an
unreadable format to prevent unauthorized access is known as decryption.

a.) True
b.) False

Hot sites Correct answer- Organizations need to include redundancy in their business
disaster recovery plan by creating duplicate facilities. Which of the following sites offer
offsite office space that allow recovery within minutes to hours?

a.) Warm sites
b.) Shared hot sites
c.) Cold sites
d.) Hot sites

A and B Correct answer- (Select all that apply). What are some of the actions that savvy
users do to protect their privacy?

a.) Delete cookies from the computer periodically
b.) Enable popup blockers
c.) Do not use anonymous browsing

Consult legal counsel and retain documentation of all stolen information Correct
answer- If your identity has been stolen, what should you do?

a.) Protect access to your information assets

b.) Understand the methods that criminals used to steal the personal information

c.) Understand which assets are irreplaceable and how they are vulnerable

d.) Consult legal counsel and retain documentation of all stolen information

A small business owner installs Microsoft Office suite on all the computers in his office
Correct answer- Which of the following action is considered ethical, social, and legally
acceptable?

Written for

Course

Document information

Uploaded on
April 1, 2022
Number of pages
12
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
june101

Get to know the seller

Seller avatar
june101 NURSING
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
4 year
Number of followers
0
Documents
5
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions