Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C724 : Unit 7 - Module 11 (Quiz Review

Beoordeling
-
Verkocht
-
Pagina's
4
Cijfer
A+
Geüpload op
26-07-2022
Geschreven in
2021/2022

WGU C724 : Unit 7 - Module 11 (Quiz Review A department mines the prior year's data to determine if there are patterns related to absenteeism on a month-by-month basis. Which department (i.e. business function) benefits from this technology? Correct answer- Human Resources A department utilizes data mining to analyze the best means of organizing their manufacturing facility to achieve operational excellence. Which department (i.e. business function) benefits from this technology? Correct answer- Productions/Operations In a recent department meeting an employee suggested that perhaps the company could save money if they re-evaluated the demand for their products based on regional weather patterns. Their goal is to improve decision making concerning pricing strategies in light of demand. Which department (i.e. business function) benefits from this technology? Correct answer- Sales/ Marketing The CEO has asked that each department reduce their budget by 5%. This department is charged with providing ROI numbers to other units within the company to aid them in making the best decisions on where to trim their budgets. Which department (i.e. business function) benefits from this technology? Correct answer- Finance/ Accounting An edge router is considered which of the following components of an Information System? Correct answer- Hardware A CEO is considered which of the following components of an Information System? Correct answer- People Issuing invoices to customers is considered which of the following components of an Information System? Correct answer- Processes An Android operating system is considered which of the following components of an Information System? Correct answer- Software Customer buying history is considered which of the following components of an Information System? Correct answer- Data Bob's Country Bunker has decided that they need to be able to track buying behavior and strategically determine how much of a discount (i.e., $5, $10, $15, etc.) to offer customers to maximize customer spending. Which of the following is a strategic benefit provided to the company Correct answer- Improved Decision Making Sally is the CEO of an auto parts manufacturing firm and she knows that price is the main criteria her customers consider when deciding who to buy from. As a result, she is looking for ways to drive down costs. She is considering an extranet to increase efficiencies when working with corporate partners. Which of the following is a strategic benefit provided to the company? Correct answer- Strong Supplier Relations Fred operates a sub shop and knows that he has many competitors, so he is always focused on making sure that customers have a good experience and feel a connection with his brand

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU C724 : Unit 7 - Module 11 (Quiz
Review)

What is the primary goal of information security? Correct answer- Reduce losses related
to losses in confidentiality, availability and integrity.

There are many different kinds of malware, which could be a spyware, worm, virus, or
Trojan horse. In general, any _______________________________________ that is
downloaded and stored on a computer hard drive can cause undesirable damage to the
computer or network system. Correct answer- Virus

There are several low-tech attacks that criminals can use to steal sensitive information
from individuals in public places. One of the most common methods is
____________________________, in which individuals are offered a gift for completing
an application for a credit card. Correct answer- Quid Pro Quo

The U.S. government enacted legislation and regulations to protect privacy and do what
else? Correct answer- Enact and enforce security, and manage and retain
documentation - Such laws and regulations include the Health Insurance Portability and
Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka
Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and
Investor Act (aka Sarbanes-Oxley Act) of 2002.

What can be used to counter the risks, vulnerabilities, and threats experienced by
managers in organizations? Correct answer- Security Measures

Which of the following is NOT a component of an organization's framework for security
and control? Correct answer- Cost-Benefit Analysis

[True/False] To gain entry to secured location at airports or the building of some
government agencies, a photo identification (which is classified as a knowledge
authentication method) is all you need to have. Correct answer- False - Photo
identification is an identity method, not knowledge method.

Computer-based actions are actions that involved the use of a computer. Which of the
following is NOT a computer-based action? Correct answer- Randomizing your online
behavior - a behavioral action that can help to deter cyber attack.

The disaster recovery plan (DRP) addresses several issues when an emergency
occurs. What item below would NOT be addressed in a DRP? Correct answer-
Businesses perform regular backups for operational databases.

, Which of the following networks is the easiest for someone to gain access to? Correct
answer- Wireless Networks - not all wireless routers are secure and protected, so
access is open.

(Select all that apply). People access the Internet all the time. What is considered
acceptable online conduct? Correct answer- Be careful with the sites you visit.
Check content before you download it.

Identity theft can be very devastating to innocent victims. What is the first step that
people can take to help lessen the severity of risk and to help mitigate or eliminate other
risks if their identities are stolen in the future? Correct answer- Understand which assets
are irreplaceable and how they are vulnerable.

The purpose of information security is to protect the information from illegal use and
unauthorized access. Which of the following is NOT part of the triad encompassing the
three categories of threats to information assets? Correct answer- Security - the three
goals of information security are Confidentiality, Integrity, and Availability.

All cyber threats or attacks are associated with computers; therefore, all computer risks
are limited to ________________________. Correct answer- Both high-tech and low-
tech attacks.

Criminals use low-tech attacks to steal sensitive information from individuals in public
places. One method is called
_____________________________________, which is leaving a jump drive
unattended in a parking lot and waiting for someone else to pick it up and connect it to
their home computer. Correct answer- Baiting

Businesses encounter losses as a direct result of exposure to security threats or risks.
Which choice would NOT be a direct loss? Correct answer- Employee Turnover

[True/False] Environmental risks alone can be easily addressed. However, the human
factor increases the challenge of mitigating environmental risks. Correct answer- True

What kind of controls manages the restrictions that employees may have to the
corporate data resources? Correct answer- Application - Application controls is a type of
configured restrictions within a specific software application, such as restrictions on the
employees who might request supplier payments, authorize payment for goods, or send
checks to suppliers.

There are two primary concepts within information security. The ____________
concept, otherwise known informally as need-to-know, indicates that access should only
be provided to those who need it to complete tasks in their job. Correct answer-
Principle of Least Privilege

Geschreven voor

Vak

Documentinformatie

Geüpload op
26 juli 2022
Bestand laatst geupdate op
26 juli 2022
Aantal pagina's
4
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMCOLLECTIVES Herzing University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1775
Lid sinds
4 jaar
Aantal volgers
1159
Documenten
23369
Laatst verkocht
2 dagen geleden
Ace Your Exams with Elite Study Resources | ExamEliteHub on Stuvia

I offer genuine and dependable exam papers that are directly obtained from well-known, reputable institutions as a highly regarded professional who specializes in sourcing study materials. These papers are invaluable resources made to help people who want to become nurses and people who work in other fields prepare for exams. Because of my extensive experience and in-depth knowledge of the subject, I take great care to ensure that each exam paper meets the highest quality, accuracy, and relevance standards, making them an essential component of any successful study plan.

Lees meer Lees minder
4.1

447 beoordelingen

5
252
4
57
3
84
2
19
1
35

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen