Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C724 : Unit 7 - Module 11 (Quiz Review)

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
04-08-2022
Written in
2022/2023

WGU C724 : Unit 7 - Module 11 (Quiz Review)

Institution
Course

Content preview

WGU C724 : Unit 7 - Module 11 (Quiz
Review)

What is the primary goal of information security? Correct answer- Reduce losses related
to losses in confidentiality, availability and integrity.

There are many different kinds of malware, which could be a spyware, worm, virus, or
Trojan horse. In general, any _______________________________________ that is
downloaded and stored on a computer hard drive can cause undesirable damage to the
computer or network system. Correct answer- Virus

There are several low-tech attacks that criminals can use to steal sensitive information
from individuals in public places. One of the most common methods is
____________________________, in which individuals are offered a gift for completing
an application for a credit card. Correct answer- Quid Pro Quo

The U.S. government enacted legislation and regulations to protect privacy and do what
else? Correct answer- Enact and enforce security, and manage and retain
documentation - Such laws and regulations include the Health Insurance Portability and
Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka
Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and
Investor Act (aka Sarbanes-Oxley Act) of 2002.

What can be used to counter the risks, vulnerabilities, and threats experienced by
managers in organizations? Correct answer- Security Measures

Which of the following is NOT a component of an organization's framework for security
and control? Correct answer- Cost-Benefit Analysis

[True/False] To gain entry to secured location at airports or the building of some
government agencies, a photo identification (which is classified as a knowledge
authentication method) is all you need to have. Correct answer- False - Photo
identification is an identity method, not knowledge method.

Computer-based actions are actions that involved the use of a computer. Which of the
following is NOT a computer-based action? Correct answer- Randomizing your online
behavior - a behavioral action that can help to deter cyber attack.

The disaster recovery plan (DRP) addresses several issues when an emergency
occurs. What item below would NOT be addressed in a DRP? Correct answer-
Businesses perform regular backups for operational databases.

Written for

Course

Document information

Uploaded on
August 4, 2022
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Aplussuccessor

Also available in package deal

Get to know the seller

Seller avatar
Aplussuccessor exams industry
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
6
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions