WGU C724 : Unit 7 - Module 11 (Quiz
Review)
What is the primary goal of information security? Correct answer- Reduce losses related
to losses in confidentiality, availability and integrity.
There are many different kinds of malware, which could be a spyware, worm, virus, or
Trojan horse. In general, any _______________________________________ that is
downloaded and stored on a computer hard drive can cause undesirable damage to the
computer or network system. Correct answer- Virus
There are several low-tech attacks that criminals can use to steal sensitive information
from individuals in public places. One of the most common methods is
____________________________, in which individuals are offered a gift for completing
an application for a credit card. Correct answer- Quid Pro Quo
The U.S. government enacted legislation and regulations to protect privacy and do what
else? Correct answer- Enact and enforce security, and manage and retain
documentation - Such laws and regulations include the Health Insurance Portability and
Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka
Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and
Investor Act (aka Sarbanes-Oxley Act) of 2002.
What can be used to counter the risks, vulnerabilities, and threats experienced by
managers in organizations? Correct answer- Security Measures
Which of the following is NOT a component of an organization's framework for security
and control? Correct answer- Cost-Benefit Analysis
[True/False] To gain entry to secured location at airports or the building of some
government agencies, a photo identification (which is classified as a knowledge
authentication method) is all you need to have. Correct answer- False - Photo
identification is an identity method, not knowledge method.
Computer-based actions are actions that involved the use of a computer. Which of the
following is NOT a computer-based action? Correct answer- Randomizing your online
behavior - a behavioral action that can help to deter cyber attack.
The disaster recovery plan (DRP) addresses several issues when an emergency
occurs. What item below would NOT be addressed in a DRP? Correct answer-
Businesses perform regular backups for operational databases.
Review)
What is the primary goal of information security? Correct answer- Reduce losses related
to losses in confidentiality, availability and integrity.
There are many different kinds of malware, which could be a spyware, worm, virus, or
Trojan horse. In general, any _______________________________________ that is
downloaded and stored on a computer hard drive can cause undesirable damage to the
computer or network system. Correct answer- Virus
There are several low-tech attacks that criminals can use to steal sensitive information
from individuals in public places. One of the most common methods is
____________________________, in which individuals are offered a gift for completing
an application for a credit card. Correct answer- Quid Pro Quo
The U.S. government enacted legislation and regulations to protect privacy and do what
else? Correct answer- Enact and enforce security, and manage and retain
documentation - Such laws and regulations include the Health Insurance Portability and
Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka
Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and
Investor Act (aka Sarbanes-Oxley Act) of 2002.
What can be used to counter the risks, vulnerabilities, and threats experienced by
managers in organizations? Correct answer- Security Measures
Which of the following is NOT a component of an organization's framework for security
and control? Correct answer- Cost-Benefit Analysis
[True/False] To gain entry to secured location at airports or the building of some
government agencies, a photo identification (which is classified as a knowledge
authentication method) is all you need to have. Correct answer- False - Photo
identification is an identity method, not knowledge method.
Computer-based actions are actions that involved the use of a computer. Which of the
following is NOT a computer-based action? Correct answer- Randomizing your online
behavior - a behavioral action that can help to deter cyber attack.
The disaster recovery plan (DRP) addresses several issues when an emergency
occurs. What item below would NOT be addressed in a DRP? Correct answer-
Businesses perform regular backups for operational databases.