Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

DCOM 258 Final UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
23-11-2025
Written in
2025/2026

DCOM 258 Final UPDATED Study Guide QUESTIONS AND CORRECT ANSWERS Which of the following would fall into the category of something the user is? A. Password B. Thumbprint C. Smartcard

Institution
Course

Content preview

dcom 258 final ACTUAL QUESTIONS
AND CORRECT ANSWERS
What is vulnerability management? - CORRECT ANSWERS
Vulnerability management involves identifying, evaluating, treating, and
reporting security vulnerabilities in IT systems, often through patching,
configuration hardening, or upgrades. It includes vulnerability scanning to
detect issues like open ports or outdated software.


What is a vulnerability scanner and its function in alerting and monitoring? -
CORRECT ANSWERS A vulnerability scanner monitors and reports
unmitigated vulnerabilities across hosts, highlighting patch or configuration
issues through consolidated results.


What is attestation in cybersecurity assessments? - CORRECT ANSWERS
Attestation is an independent verification of the effectiveness and
compliance of an organization’s security controls and practices.


What are the benefits of automation and scripting in security operations? -
CORRECT ANSWERS They improve efficiency, enforce policies,
reduce errors, enable automatic responses to threats, and provide audit trails.


What are snapshots and the different types? - CORRECT ANSWERS
Snapshots are system state captures used for data protection. Types include VM
snapshots, filesystem snapshots, and SAN snapshots.


What are Replication and Journaling? - CORRECT ANSWERS
Replication makes copies of data to different locations; journaling tracks data
changes for integrity and availability.

, Remedies for loss of data control in a BYOD scenario? - CORRECT
ANSWERS Use acceptable use policies, data classification labels, and
mobile device management (MDM) solutions.


What is DLP Quarantine? - CORRECT ANSWERS A remediation
method that denies access to a sensitive file, often by encrypting or moving it to
a restricted area.


What is privacy data? - CORRECT ANSWERS Information that
identifies or relates to an individual, such as names, medical records, or social
security numbers.


Difference between privacy and confidential data? - CORRECT ANSWERS
Privacy data pertains to individuals; confidential data can include
organizational secrets like trade secrets.


What is a data subject and their rights under GDPR/CCPA? - CORRECT
ANSWERS A person whose data is processed, with rights to access,
correct, and delete their personal data.


How is data classified for protection? - CORRECT ANSWERS By its
stateâ€"at rest, in motion, in useâ€"allowing tailored security measures.


What is Data Sovereignty? - CORRECT ANSWERS It restricts data
processing/storage to within a specific jurisdiction.


What are types of email threats? - CORRECT ANSWERS Viruses (via
attachments) and phishing (fraudulent messages for data theft).

Written for

Course

Document information

Uploaded on
November 23, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
nzomokelvin15

Get to know the seller

Seller avatar
nzomokelvin15 Stanford University
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
7 months
Number of followers
0
Documents
1511
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions