100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D027 (STUDY GUIDE) ACTUAL EXAM WITH 95 QUESTION AND CORRECT DETAILED ANSWERS WITH RATIONALES. A reasonable expectation of privacy is the same as the reasonable person standard. - ANSWERS--False All of the following are true with respect to cryptogr

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
13-04-2025
Written in
2024/2025

WGU D027 (STUDY GUIDE) ACTUAL EXAM WITH 95 QUESTION AND CORRECT DETAILED ANSWERS WITH RATIONALES. A reasonable expectation of privacy is the same as the reasonable person standard. - ANSWERS--False All of the following are true with respect to cryptography except: - ANSWERS--only used today by health care providers to protect health care data How might the average person use cookies in a beneficial way? - ANSWERS--You save an image of a relaxing, cloud-filled sky that appears every time you log-on to your Twitter account. In which of the following types of communication is phishing least likely to occur? - ANSWERS--phone calls Integrity means that information systems and their data are accurate. - ANSWERS-- True ____________ is the practice of tracking a user's actions on the Internet in order to create a user profile. - ANSWERS--Online profiling

Show more Read less
Institution
Medical Surgical
Course
Medical surgical









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Medical surgical
Course
Medical surgical

Document information

Uploaded on
April 13, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D027 (STUDY GUIDE) ACTUAL
EXAM WITH 95 QUESTION AND
CORRECT DETAILED ANSWERS WITH
RATIONALES.




A reasonable expectation of privacy is the same as the reasonable person standard. -
ANSWERS--False

All of the following are true with respect to cryptography except: - ANSWERS--only used
today by health care providers to protect health care data

How might the average person use cookies in a beneficial way? - ANSWERS--You save
an image of a relaxing, cloud-filled sky that appears every time you log-on to your
Twitter account.

In which of the following types of communication is phishing least likely to occur? -
ANSWERS--phone calls

Integrity means that information systems and their data are accurate. - ANSWERS--
True

____________ is the practice of tracking a user's actions on the Internet in order to
create a user profile. - ANSWERS--Online profiling

, A keystroke logger is harmful code intentionally left on a computer system. It lies
dormant for a certain period, and when specific conditions are met, it "explodes" and
carries out its malicious function. - ANSWERS--False

Which statement about privacy is NOT true? - ANSWERS--Privacy means that a person
can specify the collection, use, and sharing of their data.

_____________ is an individual's right to control the use and disclosure of his or her
own personal data. - ANSWERS--Privacy

______________ means that only people with the right permission can access and use
information. - ANSWERS--Confidentiality

_______________ is the process of reviewing known vulnerabilities and threats. -
ANSWERS--Risk Analysis

________________ involves tricking other people into breaking security procedures
and sharing sensitive information. - ANSWERS--Social Engineering

__________________ is a body of law developed because of legal tradition and court
cases. - ANSWERS--Common Law

___________________ refers to applying safeguards designed to lower risks to a level
deemed acceptable but without eliminating such risks. - ANSWERS--Risk Mitigation

Which type of safeguard is put in place in order to limit the damage caused by a security
incident? - ANSWERS--Corrective

Which of the following correctly summarizes an employer's right to monitor telephone
conversations? - ANSWERS--An employer has right to monitor telephone conversations
in the ordinary course of business without a court order.

Which of the following U.S. Constitution amendments contribute to the right of privacy? -
ANSWERS--First, Third, and Fourth Amendments

Which of following is not one of the categories of vulnerabilities? - ANSWERS--Domain

What situation would be an example of an exploit? - ANSWERS--An art thief sneaks
into a museum and steals a famous painting and then sneaks out of the museum
without being caught by security because the thief identified and traveled through the
museum via blind spots of the museum's security cameras. After the incident, the
museum increases the number of security guards and cameras guarding the museum
at all times.
$19.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
NurseEdwin
5.0
(1)

Get to know the seller

Seller avatar
NurseEdwin California State University - Channel Islands
View profile
Follow You need to be logged in order to follow users or courses
Sold
9
Member since
2 year
Number of followers
8
Documents
923
Last sold
3 months ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions