Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C725 Possible 2022 Questions and Answers( With Complete Solution Rated A)

Beoordeling
-
Verkocht
1
Pagina's
28
Cijfer
A+
Geüpload op
19-06-2022
Geschreven in
2021/2022

WGU C725 Possible 2022 Questions and Answers( With Complete Solution Rated A)

Instelling
Vak

Voorbeeld van de inhoud

WGU C725 Possible 2022 Questions and Answers

Information security is primarily a discipline to manage the behavior of - People

Careers in information security are booming because of which of the following factors? -
threat of cyber terrorism, gov regs, growth of the internet

Which of the following best represents the three objectives of information security? - CIA

A program for information security should include which of the following elements? -
Security policies and procedures

Which of the following topics are part of an information security practice? - Laws and
ethical practices, access controls, security architecture

Which college curriculum is more appropriate for a career in information security -
business admin and comp info sciences

The formal study of information security has accelerated primarily for what reason? -
(increasingly interconnected global networks)

Cybersecurity is like an umbrella. Under the umbrella are the following: - Compliance,
policies, standards, admin, auditing, software dev security, permission controls, incident
response, physical security, intrusion detection and prevention, ops controls, antivirus,
security testing, training and awareness, key management, public key infrastructure,
disaster recovery, access controls

The growing demand for InfoSec specialists is occurring predominantly in which of the
following types of organizations - Gov, corporations, not for profit foundations

What is meant by the phrase "the umbrella of information security"? - IS incorporates many
different pursuits and disciplines

Which of the following roles helps development teams meet security requirements? -
Security consultants

Secuyrity consultants do this: - perform risk analysis of new systems by balancing the
needs of business with the threats that stem from opening up access to data or managing
new information that could compromise the business if it fell into the wrong hands.

Who is responsible for ensuring that systems are auditable and protected from excessive
privileges? - Security admins

,Security admins do this - help to establish new user accounts, ensure that auditing
mechanisms are present and operating as needed, ensure that communications between
systems are securely implemented, and assist in troubleshooting problems and responding
to incidents that could compromise confidentiality, integrity, or availability of the systems.

Which of the following roles is responsible for ensuring that third-party suppliers and
outsourced functions remain in security compliance? - Vendor managers

Vendor managers are needed to - ensrue that outsourced functions are operating within
security policies and standards

Confidentiality is sometimes referred to as - the principle of least privilege, meaning that
users should be given only enough privilege to perform their duties, and no more. Some
other synonyms for confidentiality you might encounter include privacy, secrecy, and
discretion.

Confidentiality models are primarily intended to - ensure that no unauthorized access to
information is permitted and that accidental disclosure of sensitive information is not
possible. Common confidentiality controls are user IDs and passwords

Related to information security, confidentiality is the opposite of which of the following? -
Disclosure

One way to think of the CIA triad... - Protect the confidentiality of data
Preserve the integrity of data
Promote the availability of data for authorized use

Integrity models ... - keep data pure and trustworthy by protecting system data from
intentional or accidental changes.

Integrity models have three goals: - Prevent unauthorized users from making modifications
to data or programs
Prevent authorized users from making improper or unauthorized modifications
Maintain internal and external consistency of data and programs

An example of integrity checks is - balancing a batch of transactions to make sure that all
the information is present and accurately accounted for.

Availability models ... - keep data and resources available for authorized use, especially
during emergencies or disasters.

Information security professionals usually address three common challenges to
availability: - Denial of service (DoS) due to intentional attacks or because of undiscovered
flaws in implementation (for example, a program written by a programmer who is unaware
of a flaw that could crash the program if a certain unexpected input is encountered)

, Loss of information system capabilities because of natural disasters (fires, floods, storms,
or earthquakes) or human actions (bombs or strikes)
Equipment failures during normal use

Some activities that preserve confidentiality, integrity, and/or availability are - granting
access only to authorized personnel, applying encryption to information that will be sent
over the Internet or stored on digital media, periodically testing computer system security
to uncover new vulnerabilities, building software defensively, and developing a disaster
recovery plan to ensure that the business can continue to exist in the event of a disaster or
loss of access by personnel.

Which of the following represents the three goals of information security? Spell it out -
Confidentiality, Integrity, and availability

Layered security, as in the previous example, is known as defense in depth... So - This
security is implemented in overlapping layers that provide the three elements needed to
secure assets: prevention, detection, and response. Defense in depth also seeks to offset the
weaknesses of one security layer by the strengths of two or more layers.

Defense in depth is needed to ensure that which three mandatory activities are present in a
security system? - (prevention, detection, and response

. Verification is the process of - confirming that one or more predetermined requirements
or specifications are met.

Validation then determines the - correctness or quality of the mechanisms used to meet the
needs. In other words, you can develop software that addresses a need, but it might contain
flaws that could compromise data when placed in the hands of a malicious user

Verification testing for seat belt functions might include - conducting stress tests on the
fabric, testing the locking mechanisms, and making certain the belt will fit the intended
application, thus completing the functional tests.

Validation, or assurance testing, might then include - crashing the car with crash-test
dummies inside to "prove" that the seat belt is indeed safe when used under normal
conditions and that it can survive under harsh conditions.

Which of the following best represents the two types of IT security requirements? -
Functional and assurance

Functional requirements describe - what a system should do.

Assurance requirements describe - how functional requirements should be implemented
and tested.

Geschreven voor

Vak

Documentinformatie

Geüpload op
19 juni 2022
Aantal pagina's
28
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Succeed Havard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1826
Lid sinds
6 jaar
Aantal volgers
1499
Documenten
5753
Laatst verkocht
22 uur geleden

3.9

293 beoordelingen

5
167
4
34
3
36
2
9
1
47

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen