WGU C725 Information Security and Assurance | Questions with 100% Correct Answers | Verified | Latest Update
Which two passwords are the weakest? Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - Love@$MySon80 Password1234 Which groups typically report to the chief security officer (CSO)? - Security engineering and operations What is the formula for computing single loss expectancy - SLE = AV x EF [Single Loss Expectancy = Asset Value x Exposure Factor] A violation of the "separation of duties" principle arises when the security systems software is accessed by which of the following individuals? - Systems programmer An example of the separation of duties of a computer operation is when a company has one environment for the software developers, another for quality assurance testing, and a third for production, or the environment that end users access, to perform their duties. As software is deemed ready, it is promoted from environment to environment by systems and security
Geschreven voor
Documentinformatie
- Geüpload op
- 18 juni 2023
- Aantal pagina's
- 7
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
wgu c725 information security and assurance | ques
Ook beschikbaar in voordeelbundel