100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C845 INFORMATION SYSTEMS SECURITY VUN1 TASK 3: EVALUATING & DEFENDING DATA SECURITY AND SYSTEM OPERATIONS | COMPLETE A+ GUIDE

Beoordeling
-
Verkocht
-
Pagina's
587
Cijfer
A+
Geüpload op
23-01-2026
Geschreven in
2025/2026

WGU C845 INFORMATION SYSTEMS SECURITY VUN1 TASK 3: EVALUATING & DEFENDING DATA SECURITY AND SYSTEM OPERATIONS | COMPLETE A+ GUIDE

Instelling
WGU C845
Vak
WGU C845











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C845
Vak
WGU C845

Documentinformatie

Geüpload op
23 januari 2026
Aantal pagina's
587
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

1|Page




WGU C845 INFORMATION SYSTEMS SECURITY VUN1

TASK 3: EVALUATING & DEFENDING DATA

SECURITY AND SYSTEM OPERATIONS | COMPLETE

A+ GUIDE




A 'Pseudo flaw' is which of the following?



A. An apparent loophole deliberately implanted in an operating system program as a trap for

intruders.

B. An omission when generating Psuedo-code.

C. Used for testing for bounds violations in application programming.

D. A normally generated page fault causing the system to halt. - - ANS✔️--A



A backup site is best described by which of the following options?

,2|Page


A A computer facility with power and HVAC and all servers and communications. All

applications are ready to be installed and configured, and recent data is available to be restored to

the site.



B A computer facility with electrical power and HVAC but with no applications or installed data

on the workstations or servers prior to the event



C A computer facility with available electrical power and HVAC and some print/file servers. No

equipment has been installed at the site.



D An alternate computing location with little power and air-conditioning is but no

telecommunications capability - - ANS✔️--A



A BCP determined that the maximum amount of data that an organization can afford to lose from

an online database is most recent 60 Minutes of online transactions. Which of the following is a

valid Choice based on the BCP conclusion?



A the recovery time objective needs to be less than 1 hour

B the recovery time needs to be more than one hour

C the recovery Point objective needs to be less than 1 hour

D the recovery Point objective needs to be more than one hour - - ANS✔️--C



A business asset is best described by which of the following?

,3|Page




A Competitive advantage, capability, credibility, or goodwill

B Controls put in place that reduce the effects of threats

C An asset loss that could cause a financial or operational impact to the organization

D Personnel, compensation, and retirement programs - - ANS✔️--A



A business continuity plan is an example of which of the following?



A. Corrective control

B. Detective control

C. Preventive control

D. Compensating control - - ANS✔️--A



A Business Continuity Plan should be tested:



A. Once a month.

B. At least twice a year.

C. At least once a year.

D. At least once every two years. - - ANS✔️--C



A business continuity plan should list and prioritize the services that need to be brought back

after a disaster strikes. Which of the following services is more likely to be of primary concern in

the context of what your Disaster Recovery Plan would include?

, 4|Page




A. Marketing/Public relations

B. Data/Telecomm/IS facilities

C. IS Operations

D. Facilities security - - ANS✔️--B



A business is preparing to create an e-commerce website. It wants to make sure that the

business's website is trusted when an HTTP session is established. What should the business do?



A Use SSL in all sessions

B Ensure that the checkout process is encrypted

C Purchase a certificate from a public CA

D Publish a certificate from a private CA - - ANS✔️--C



A central authority determines what subjects can have access to certain objects based on the

organizational security policy is called:



A. Mandatory Access Control

B. Discretionary Access Control

C. Non-Discretionary Access Control

D. Rule-based Access control - - ANS✔️--C
$18.49
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
StudyWizard23
1.0
(1)

Maak kennis met de verkoper

Seller avatar
StudyWizard23 Teachme2-tutor
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
1 jaar
Aantal volgers
0
Documenten
216
Laatst verkocht
2 weken geleden
StudyWizardLeviStuvia

StudyWizardLeviStuvia

1.0

1 beoordelingen

5
0
4
0
3
0
2
0
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen