WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT | 2026
UPDATE WITH COMPLETE SOLUTION
Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal
oversight agencies, including all except: - -Securities Investor Protection
Corporation (SIPC)
--Which of the following is another term for statutory law? - -Legislation
--Regulatory compliance is a powerful driver for many organizations. - -
True
--What are the possible outcomes of policy review? - -The policy is retired
or reauthorized
--Which of the following is not an example of an information asset? - -
Building directory
--Which of the following statements is true? - -Policies should require only
what is possible.
--A cybersecurity policy must take into account all these factors except: - -
The cultural norms of the general public
--Which of the following is the correct order of the policy life cycle? - -
Develop, publish, adopt, review
--Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS
devices, segmentation, and VLANs? - -Perimeter security
--Which of the following can be defined as the shared attitudes, goals, and
practices that characterize a company, corporation, or institution? - -
Corporate culture
--
UPDATE WITH COMPLETE SOLUTION
Enforcement of Gramm-Leach-Bliley Act (GLBA) was assigned to federal
oversight agencies, including all except: - -Securities Investor Protection
Corporation (SIPC)
--Which of the following is another term for statutory law? - -Legislation
--Regulatory compliance is a powerful driver for many organizations. - -
True
--What are the possible outcomes of policy review? - -The policy is retired
or reauthorized
--Which of the following is not an example of an information asset? - -
Building directory
--Which of the following statements is true? - -Policies should require only
what is possible.
--A cybersecurity policy must take into account all these factors except: - -
The cultural norms of the general public
--Which of the following is the correct order of the policy life cycle? - -
Develop, publish, adopt, review
--Which layer in the defense-in-depth strategy includes firewalls, IDS/IPS
devices, segmentation, and VLANs? - -Perimeter security
--Which of the following can be defined as the shared attitudes, goals, and
practices that characterize a company, corporation, or institution? - -
Corporate culture
--