Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C725 - Information Security and Assurance Study Guide

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
05-09-2025
Geschreven in
2025/2026

WGU C725 - Information Security and Assurance Study Guide This guide breaks down the core domains of the C725 course into digestible sections with over 100 key concepts presented as questions and answers. Domain 1: Foundational Security Concepts 1. What is the core objective of Information Security (InfoSec)?  ANSWER To protect the confidentiality, integrity, and availability of information and information systems, known as the CIA Triad. 2. Define Confidentiality.  ANSWER The principle of ensuring that information is not disclosed to unauthorized individuals, processes, or devices. (e.g., Encryption, access controls). 3. Define Integrity.  ANSWER The principle of guarding against improper information modification or destruction to ensure information non-repudiation and authenticity. (e.g., Hashing, digital signatures). 4. Define Availability.  ANSWER The principle of ensuring timely and reliable access to and use of information for authorized users. (e.g., Redundancy, fault tolerance, backups). 5. What is Non-repudiation?  ANSWER A security service that provides proof of the origin and integrity of data, preventing a party from denying having sent a message or performed an action. (e.g., Digital signatures). 6. What is the difference between a Threat, a Vulnerability, and a Risk?  ANSWER A Threat is any potential danger to an asset. A Vulnerability is a weakness in a system that can be exploited by a threat. Risk is the likelihood that a threat will exploit a vulnerability and the resulting impact. 7. What is the purpose of a Risk Assessment?  ANSWER To identify, estimate, and prioritize risks to organizational operations, assets, and individuals. 8. What are the four common Risk Response strategies?  ANSWER Acceptance (acknowledge the risk), Avoidance (stop the activity causing the risk), Mitigation (implement controls to reduce the risk), Transference (shift the risk to a third party, e.g., insurance). 9. What is the principle of Least Privilege?  ANSWER Granting users only the minimum levels of access—or permissions— necessary to perform their job functions. 10. What is Defense in Depth (Layered Defense)?  ANSWER A security strategy that employs multiple, layered defensive mechanisms to protect assets. If one mechanism fails, another steps up. (e.g., Firewall, IPS, antivirus, user training).

Meer zien Lees minder
Instelling
WGU C725
Vak
WGU C725

Voorbeeld van de inhoud

WGU C725 - Information Security and Assurance Study Guide
This guide breaks down the core domains of the C725 course into digestible sections
with over 100 key concepts presented as questions and answers.

Domain 1: Foundational Security Concepts

1. What is the core objective of Information Security (InfoSec)?

 ANSWER ✓ To protect the confidentiality, integrity, and availability of information and
information systems, known as the CIA Triad.

2. Define Confidentiality.

 ANSWER ✓ The principle of ensuring that information is not disclosed to unauthorized
individuals, processes, or devices. (e.g., Encryption, access controls).

3. Define Integrity.

 ANSWER ✓ The principle of guarding against improper information modification or
destruction to ensure information non-repudiation and authenticity. (e.g., Hashing,
digital signatures).

4. Define Availability.

 ANSWER ✓ The principle of ensuring timely and reliable access to and use of
information for authorized users. (e.g., Redundancy, fault tolerance, backups).

5. What is Non-repudiation?

 ANSWER ✓ A security service that provides proof of the origin and integrity of data,
preventing a party from denying having sent a message or performed an action. (e.g.,
Digital signatures).

6. What is the difference between a Threat, a Vulnerability, and a Risk?

 ANSWER ✓ A Threat is any potential danger to an asset. A Vulnerability is a weakness
in a system that can be exploited by a threat. Risk is the likelihood that a threat will
exploit a vulnerability and the resulting impact.

7. What is the purpose of a Risk Assessment?

,  ANSWER ✓ To identify, estimate, and prioritize risks to organizational operations, assets,
and individuals.

8. What are the four common Risk Response strategies?

 ANSWER ✓ Acceptance (acknowledge the risk), Avoidance (stop the activity causing
the risk), Mitigation (implement controls to reduce the risk), Transference (shift the risk
to a third party, e.g., insurance).

9. What is the principle of Least Privilege?

 ANSWER ✓ Granting users only the minimum levels of access—or permissions—
necessary to perform their job functions.

10. What is Defense in Depth (Layered Defense)?

 ANSWER ✓ A security strategy that employs multiple, layered defensive mechanisms to
protect assets. If one mechanism fails, another steps up. (e.g., Firewall, IPS, antivirus, user
training).




Domain 2: Security Governance and Compliance

11. What is a Security Policy?

 ANSWER ✓ A formal, high-level document that defines an organization's security goals,
culture, and expectations for secure behavior. It is mandatory.

12. What is the difference between a Standard, a Guideline, and a Procedure?

 ANSWER ✓ A Standard is a mandatory rule supporting a policy. A Guideline is a
recommended, non-mandatory action. A Procedure is a detailed, step-by-step
instruction for accomplishing a specific task.

13. What are the three main types of security controls?

 ANSWER ✓ Administrative (policies, procedures), Technical (firewalls, encryption),
and Physical (locks, guards).

14. What is the purpose of a Business Impact Analysis (BIA)?

Geschreven voor

Instelling
WGU C725
Vak
WGU C725

Documentinformatie

Geüpload op
5 september 2025
Aantal pagina's
10
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.39
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SmartscoreAaron Chicago State University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
77
Lid sinds
1 jaar
Aantal volgers
6
Documenten
4009
Laatst verkocht
2 dagen geleden
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.1

7 beoordelingen

5
3
4
1
3
0
2
0
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen