Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 - ITAS 3050 Information Systems Security Latest Complete OA Guide With Verified correct question and Answers(Graded A+

Beoordeling
-
Verkocht
-
Pagina's
41
Cijfer
A+
Geüpload op
18-07-2024
Geschreven in
2023/2024

WGU C845 - ITAS 3050 Information Systems Security Latest Complete OA Guide With Verified correct question and Answers(Graded A+ WGU C845 - ITAS 3050 Information Systems Security Latest Complete OA Guide With Verified correct question and Answers(Graded A+ WGU C845 - ITAS 3050 Information Systems Security Latest Complete OA Guide With Verified correct question and Answers(Graded A+

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

WGU C845 - ITAS 3050 Information Systems Security Latest
Complete OA Guide 2024-2025 With Verified correct
question and Answers(Graded A+




During what phase of the change management process does the organization conduct peer
review of the change for accuracy and completeness? - answer- Analysis/Impact Assessment


Steve is responsible for work stations that handle proprietary information. What is the best
option for these workstations at the end of their lifecycle? - answer- Sanitization


What is the earliest stage of a fire to use detection technology to identify it? - answer- Incipient


What security control would provide the best defense against a threat actor trying to execute a
buffer overflow attack against a custom application? - answer- Parameter Checking/Input
Validation


Which of the following is NOT true of the ISC2 Code of Ethics?
A. Adherence to the Code of Ethics is a condition of Certification
B. The code of ethics applies to all security professionals
C. Failure to comply with the Code of Ethics could result in revocation of certification
D. Members who observe a breach of the Code of Ethics are required to report the possible
violation - answer- B.


Under what type of software license does the recipient of software have an unlimited right to
copy, modify, distribute, or resell a software package? - answer- Public Domain


What should Steve do if a FAR/FRR diagram does not provide an acceptable performance level
for his organization's needs? - answer- Assess other biometric systems to compare them since
the CER is used to assess biometric devices.

,What is the CER in biometric device measurment? - answer- Crossover Error Rate is the
number that results when a biometric device is adjusted to provide equal false acceptance and
false rejection rates.


What type of access control would be the best choice for a person that would like to support a
declaration like "Only allow access to customer service on managed devices on the wireless
network between 8 am and 7 pm"? - answer- Attribute Based Access Control ABAC


What is the benefit of an ABAC over a RBAC? - answer- An ABAC can be more specific thus
more flexible


What is the primary advantage of decentralized access control? - answer- It provides control of
access to people closer to the resources


How are rules set in ABAC systems? - answer- Uses boolean logic statements which allow it to
be more flexible than RBAC for temporary rules such as to allow time limited access.


Which of the following is best described as an access control model that focuses on subjects
and identifies the objects that each subject can access?
A. Access control list
B. Capability Table
C. Implicit denial list
D. Rights Management Matrix - answer- B


Adam is accessing a standalone file server using a username and password provided by the
server administrator. Which one of the following entities is guaranteed to have information
necessary to complete the authorization process?
A. File Server
B. Adam
C. Server Administrator
D. Adam's Supervisor - answer- A. The file server has the correct information on what activities
Adam is AUTHORIZED to perform

,A new member at a 24 hour gym that uses fingerprints to gain access after hours is surprised to
find out that he is registering as a different member. What type of biometric factor error
occurred? - answer- Since he was accepted as a different member this was a Type 2 (false
positive) error. If he was not accepted and the door remained locked it would have been a Type
1 (false negative) error.


You are tasked with adjusting your organizations password requirements to make them align
with best practices from NIST. What should you set password expiration to? - answer- NIST
Special Publication 800-63b suggests that organizations should not impose password expiration
requirements on end users


What access control scheme labels subjects and objects and allows subjects to access objects
when labels match? - answer- Mandatory Access Control (MAC)


Mandatory Access Control is based on what type of model? - answer- Lattice Based


You need to create a trust relationship between your company and a vendor. You need to
implement the system so that it will allow users from the vendor's organization to access your
accounts payable system using the accounts created for them by the vendor. What type of
authentication do you need to implement? - answer- This type of authentication, where one
domain trusts users from another domain, is called federation.


Users change job positions quite often at your new company. Which type of access control
would make it easier to allow administrators to adjust permissions when these changes occur?
A. Role-Based Access Control
B. Mandatory Access Control
C. Discretionary Access Control
D. Rule-Based Access Control - answer- A Role-Based Access Control would assign
permission to roles and then the administrator would simply adjust the role of the user when he
or she changes jobs


Which of the following authenticators is appropriate to use by itself rather than in combination
with other biometric factors?
A. Voice pattern recognition
B. Hand geometry
C. Palm scans

, D. Heart/pulse patterns - answer- C. Palm scans compare the vein patterns in the palm to a
database to authenticate a user.


As part of hiring a new employee, Sven's identity management team creates a new user object
and ensures that the user object is available in the directories and systems where it is needed.
What is this process called? - answer- Provisioning includes the creation, maintenance, and
removal of user objects from applications, systems, and directories.


The Linux filesystem allows the owners of objects to determine the access rights that subjects
have to them. What type of access control does Linux use? - answer- Discretionary Access
Control


Mary's organization handles very sensitive governmental agency information. They need to
implement an access control system that allows administrators to set access rights but does not
allow the delegation of those rights to other users. What is the best type of access control
design for Mary's organization? - answer- Mandatory Access Control (MAC) systems allow an
administrator to configure access permissions but do not allow users to delegate permission to
others.


What term is used to describe the default set of privileges assigned to a user when a new
account is created?
A. Aggregation
B. Transitivity
C. Baseline
D. Entitlement - answer- D. Entitlement refers to the privileges granted to useres when an
account is first provisioned.


Steve is the risk manager for a company on the east coast of the United States. He recently
undertook a replacement cost analysis and determined that rebuilding and reconfiguring the
data center would cost $20 million. Steve consulted with hurricane experts, data center
specialists, and structural engineers and they determined that a typical CAT 3 hurricane that
successfully hits the east coast would cause approximately $5 million in damages. The
meteorologists determined that Steve's facility lies in an area where they are likely to experience
a CAT 3 hurricane once every 10 years.


Based upon the information in this scenario, what is the exposure factor for the effect of a CAT 3
hurricane on Steve's data center? - answer- The exposure factor is the percentage of the
facility that risk managers expect will be damaged if a risk materializes. It is calculated by

Geschreven voor

Vak

Documentinformatie

Geüpload op
18 juli 2024
Aantal pagina's
41
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$21.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
nicholasmuriithi708

Maak kennis met de verkoper

Seller avatar
nicholasmuriithi708 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
33
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen