Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT | 2026 UPDATE WITH COMPLETE SOLUTION

Beoordeling
-
Verkocht
-
Pagina's
60
Cijfer
A+
Geüpload op
05-03-2026
Geschreven in
2025/2026

WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT | 2026 UPDATE WITH COMPLETE SOLUTION What are the three distinct groups of managers and professionals, or communities of interest? - (ANSWER) • Those in the field of information security • Those in the field of IT • Those from the rest of the organization What does the information security community do? - (ANSWER) They protect the organization's information assets from the many threats they face What does the IT community do? - (ANSWER) They support the business objectives of the organization by supplying and supporting IT that is appropriate to the organization's needs What does the general business community do? - (ANSWER) They articulate and communicate organizational policy and objectives and allocates resources to the other groups What does security mean? - (ANSWER) Being free from danger and protected from the risk of loss, damage, unwanted modification, and other hazards Security is often achieved by doing what? - (ANSWER) Creating several strategies undertaken simultaneously or used in combination with one another What are the specialized areas of security? - (ANSWER) • Physical security • Operations security • Communications security • Cyber (or computer) security • Network security What does information security focus on? - (ANSWER) The protection of information and the characteristics that give it value, such as confidentiality, integrity, and availability, and includes the technology that houses and transfers that information through a variety of protection mechanisms such as policy, training and awareness programs, and technology What is another name for the NSTISSI (or CNSS) Security Model? - (ANSWER) The McCumber Cube What does the C.I.A triad stand for? - (ANSWER) Confidentiality, integrity, and availability What is confidentiality? - (ANSWER) An attribute of information that describes how data is protected from disclosure or exposure to unauthorized individuals or systems How do you protect the confidentiality of information? - (ANSWER) • Information classification • Secure document (and data) storage • Application of general security policies • Education of information custodians and end users • Cryptography (encryption) What is integrity? - (ANSWER) An attribute of information that describes how data is whole, complete, and uncorrupted How can corruption of information occur? - (ANSWER) While being entered, stored, or transmitted What is availability? - (ANSWER) An attribute of information that describes how data is accessible and correctly formatted for use without interference or obstruction What does availability NOT mean? - (ANSWER) Information is accessible to any user What is privacy? - (ANSWER) The right of individuals or groups to protect themselves and their information from unauthorized access, providing confidentiality What does privacy NOT mean? - (ANSWER) Freedom from observation What is information aggregation? - (ANSWER) To collect and combine personal information from several different sources What is identification? - (ANSWER) The access control mechanism where by unverified entities who seek access to a resource provide a label by which they are known to the system What are examples of identification? - (ANSWER) Usernames, User ID's, etc. What is authentication? - (ANSWER) The access control mechanism that requires the validation and verification of an unauthenticated entity's purported identity What are examples of authentication? - (ANSWER) Personal identification number(PIN), a password, or a passphrase What is authorization? - (ANSWER) The access control mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels How does authorization affect what a user can do? - (ANSWER) It can explicitly permit authority such as accessing, modifying, or deleting the contents of an information asset What is accountability? - (ANSWER) The access control mechanism that ensures allocations on a system—authorized or unauthorized—can be attributed to an authenticated identity What is accountability also known as? - (ANSWER) Auditability What is accountability most commonly associated with? - (ANSWER) System audit logs To protect an organization what must you do? - (ANSWER) Know yourself and know your enemy What is a threat? - (ANSWER) A potential risk to an information asset What is an attack or threat event? QUIZ QUESTION - (ANSWER) An ongoing act against the asset that could result in a loss What do threat agents do? - (ANSWER) Damage or steal an organization's information or physical assets by using exploits to take advantage of a vulnerability where controls are not present or no longer effective Attack - (ANSWER) An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it Exploit - (ANSWER) A technique used to compromise a system... Threat agents may attempt to exploit a system or other information asset by using it illegally for their personal gain Vulnerability - (ANSWER) Potential weakness in an asset or its defensive control system(s) Compromises to intellectual property - (ANSWER) Piracy, copyright infringement Deviations in quality of service - (ANSWER) Internet service providers (ISP), power, or WAN service problems Espionage or trespass - (ANSWER) Unauthorized access or data collection Forces of nature - (ANSWER) Fire, floods, earthquakes, lightning Human error or failure - (ANSWER) Accidents, employee mistakes Information extortion - (ANSWER) Blackmail, information disclosure Sabotage or vandalism - (ANSWER) Destruction of systems or information Software attacks - (ANSWER) Viruses, worms, macros, denial of service Technical hardware failures or errors - (ANSWER) Equipment failure Technical software failures or errors - (ANSWER) Bugs, code problems, unknown loopholes Technological obsolescence - (ANSWER) Antiquated or outdated technologies Theft - (ANSWER) Illegal confiscation or equipment or information What is intellectual property? - (ANSWER) Trade secrets, copyrights, trademarks, and patents True or false: Is Intellectual property protected by laws? - (ANSWER) True What are IP categories? - (ANSWER) • Software piracy • Copyright protection and user registration What does deviations in quality of service constitute? - (ANSWER) Successful operation of many interdependent support systems What are subcategories in the deviations of quality of service? - (ANSWER) • Internet service issues • Communications and other service provider issues • Power irregularities What is industrial espionage? - (ANSWER) When information gatherers employ techniques that cross a legal or ethical threshold, True or false: Is password cracking considered espionage or trespassing? - (ANSWER) True What are other types of password cracking? - (ANSWER) • Brute force attack • Dictionary password attack • Rainbow tables • Social engineering password attack What is force majeure or "superior force"? - (ANSWER) Forces of nature as well as civil disorder and acts of war One of the greatest threats to an organization's information security is ___________. - (ANSWER) Its own employees

Meer zien Lees minder
Instelling
D489
Vak
D489

Voorbeeld van de inhoud

1234367427426778949 4633763867 936
9497947674


!"#$%&'("%)&%*+#)
963497694,
!"#$%&'("%)&%*+#)-!
!"#$%).#/("%.%$(#)("%#.01'&21(&#'

123487427963497694,94,834561789:27,
6474427639;349<963493 7464273,426734427,
37

123487427=:94,834561789:27,64427
>97 >?749@7427639;349>,,9 38649 =:
4234936693474427639;349<778

1234874277763>97 94,834561789:27,
3649347389347639;34939,38>?749@738
33476767442742766


,01235678879 3720777652725

637937563178
6
6885227 237565923625
631712!258

79 386372917"75#561230$723
87"72
83237785732
78
32768
687596#236
316726317

0123273178
792
!7527286879 3%&'()*+,-.-/0123456-
879 3
.-789:5;3<=2-294>:3;1
.-?<@@>=345;3<=2-294>:3;1
.-?1A9:-%<:-4<@8>;9:,-294>:3;1
.-'9;B<:C-294>:3;1

012356786236879 369860D17
637936
6623625317912293783983123"73"2
789128
965732
337 3252"2
2#
3259
57831737916
6
31231687825328783123623631612"2736
637936
79128889128
6
932252 27788
62825
37916
6


,01235627831972 983198 95389

0

19 99

0123896319
35263278
0

8759735253!
5739"53!272#252553

0123568759735253
0


72335398578 235873123
9659618$23256%839398 5686989&%86938
723185'9575#52686639 6

(8$88%839331987597352538578 23587)*+,-./0121
78 235872665523587
21,345631784593:;1)<:717<;<01=;86<>3
21*??@A4<;A8:18B1>3:36<@1=3456A;C1?8@A4A3=
21.754<;A8:18B1A:B869<;A8:145=;87A<:=1<:713:715=36=
21D6C?;8>6<?EC1)3:46C?;A8:0

0123565739"53
0


72335398578 235873123
9659618$23256$189!8 %939!2778 %39

(8$278 %35878578 235878
0

0159957"
97399!6389!83276 5339


, 01235627258295853 023359352353123
6
5961
232562

665982

382336
5313
53
963
35

0123627258295853
2023556
2

66598326

012356!572
015"135575286"!63
!3
3316876231552352315#2

66$
!755"
5352853

01236!572

20%
967235

01235652352"""2350
88
32
95
!62852356728536
6

0123565355
235012

66
38
1256

1975535356
16&2

66326
!752
82989
15
1312&
331663

01232'2!865355
2350(626$(6
)*6$3
+

Geschreven voor

Instelling
D489
Vak
D489

Documentinformatie

Geüpload op
5 maart 2026
Aantal pagina's
60
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Studix Chamberlain College Of Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
40
Lid sinds
1 jaar
Aantal volgers
7
Documenten
1140
Laatst verkocht
1 week geleden
STUDIXHUB

STUDIXHUB Welcome to your one-stop destination for high-quality academic resources! Here you’ll find test banks, solution manuals, ATI study guides, iHuman case studies, nursing exam prep materials, and verified textbook answers — all carefully selected to help you study smarter and score higher. Whether you’re preparing for nursing exams, business courses, medical case studies, or general college tests, this store offers reliable, up-to-date materials used by top students worldwide. Popular categories include: ✅ Test Banks &amp; Solution Manuals ✅ ATI &amp; HESI Study Guides ✅ iHuman Case Studies &amp; Answers ✅ NCLEX &amp; Nursing Exam Prep ✅ Business, Accounting &amp; Economics Test Banks ✅ Psychology, Biology &amp; Anatomy Materials Boost your academic performance with expertly curated resources that match real exams and class content.

Lees meer Lees minder
3.7

10 beoordelingen

5
5
4
2
3
0
2
1
1
2

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen