100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D487 Cybersecurity & Information Security Management Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!!

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
14-01-2026
Written in
2025/2026

WGU D487 Cybersecurity & Information Security Management Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. What is the risk management process? - ANSWER - Identify Assets - identifying and categorizing assets that we're protecting - Identify Threats- identify threats - Assess Vulnerabilities- look for impacts - Assess Risks- assess the risk overall - Mitigate Risk- ensure that a given type of threat is accounted for. 2. Incident response process: - ANSWER Preparation- the activties that we can perform, in advance of the incident itsself, in order to better enable us to handle it. - Detection and Analysis (Identification)- detect the occurrence of an issue and decide whether or not it is actually an incident, so that we can respond appropriately . - Containment- involves taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm. - Eradication- attempt to remove the effects of the issue from our environment. - Recovery- restoring devices or data to pre-incident state (rebuilding systems, reloading applications, backup media, etc. - Post-incident activity- determine specifically what happened, why it happened and what we can to keep it from happening again. 3. Authorization - ANSWER what the user can assess, modify, delete 4. Least privilege - ANSWER giving the bare minimum level of access it needs to perform its job/functionality 5. What makes Access Control - ANSWER Allowing- lets us give a particular party access to a given source. - Denying- opposite of gaining access . - Limiting- allowing some access to our resource, only up to a certain point - Revoking- takes access away from former user - Access Control List- info about what kind of access certain parties are allowed to have to a given system. - Network ACL- filter access rules for incoming and outgoing network transactions, such as Internet Protocol (IP) Addresses, Media Access Control (MAC) addresses, and ports. 6. Discretionary (DAC) *Access Control Models - ANSWER owner of resources determines who gets access and what level of 7. Mandatory (MAC) *Access Control Models - ANSWER separate group or individual (from owner) has the authority to set access to recourses 8. Rule-based *Access Control Models - ANSWER allows access according to a set of rules defined by the system administrator 9. Role-based (RBAC) *Access Control Models - ANSWER functions access controls set by an authority responsible for doing so, rather than by the owner of the resource 10. Attribute-based (ABAC) *Access Control Models - ANSWER based on attributes, such as of a person, resource, or an environment 11. Accountability *Access Control Models - ANSWER refers to making sure that a person is responsible for their actions. It provides us with the means to trace activities in our environment back to their source. 12. Nonrepudiation *Access Control Models - ANSWER a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement or taken an action 13. Intrusion detection (IDSes) *Access Control Models - ANSWER monitors and reports malicious events 14. Intrusion prevention (IPSes) *Access Control Models - ANSWER takes actions when malicious events occur 15. Auditing *Access Control Models - ANSWER the examination and review of an organizations records to ensure accountability through technical means

Show more Read less
Institution
WGU D487 OA
Course
WGU D487 OA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D487 OA
Course
WGU D487 OA

Document information

Uploaded on
January 14, 2026
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d487
  • cybersecurity

Content preview

WGU D487 Cybersecurity & Information Security
Management Comprehensive Resource To Help You Ace
2026-2027 Includes Frequently Tested Questions With
ELABORATED 100% Correct COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!!

Current Update!!



1. What is the risk management process? - ANSWER Identify Assets-
identifying and categorizing assets that we're protecting
Identify Threats- identify threats
Assess Vulnerabilities- look for impacts
Assess Risks- assess the risk overall
Mitigate Risk- ensure that a given type of threat is accounted for.



2. Incident response process: - ANSWER Preparation- the activties that we
can perform, in advance of the incident itsself, in order to better enable us
to handle it.
Detection and Analysis (Identification)- detect the occurrence of an issue and
decide whether or not it is actually an incident, so that we can respond
appropriately
Containment- involves taking steps to ensure that the situation does not cause any
more damage than it already has, or to at least lessen any ongoing harm
Eradication- attempt to remove the effects of the issue from our environment
Recovery- restoring devices or data to pre-incident state (rebuilding systems,
reloading applications, backup media, etc.

,Post-incident activity- determine specifically what happened, why it happened
and what we can to keep it from happening again.



3. Authorization - ANSWER what the user can assess, modify, delete



4. Least privilege - ANSWER giving the bare minimum level of access it
needs to perform its job/functionality



5. What makes Access Control - ANSWER Allowing- lets us give a
particular party access to a given source
Denying- opposite of gaining access
Limiting- allowing some access to our resource, only up to a certain point
Revoking- takes access away from former user
Access Control List- info about what kind of access certain parties are allowed to
have to a given system
Network ACL- filter access rules for incoming and outgoing network transactions,
such as Internet Protocol (IP) Addresses, Media Access Control (MAC) addresses,
and ports



6. Discretionary (DAC) *Access Control Models - ANSWER owner of
resources determines who gets access and what level of



7. Mandatory (MAC) *Access Control Models - ANSWER separate group or
individual (from owner) has the authority to set access to recourses

,8. Rule-based *Access Control Models - ANSWER allows access according
to a set of rules defined by the system administrator



9. Role-based (RBAC) *Access Control Models - ANSWER functions access
controls set by an authority responsible for doing so, rather than by the
owner of the resource



10. Attribute-based (ABAC) *Access Control Models - ANSWER based on
attributes, such as of a person, resource, or an environment



11. Accountability *Access Control Models - ANSWER refers to making sure
that a person is responsible for their actions. It provides us with the means
to trace activities in our environment back to their source.



12. Nonrepudiation *Access Control Models - ANSWER a situation in which
sufficient evidence exists as to prevent an individual from successfully
denying that he or she has made a statement or taken an action



13. Intrusion detection (IDSes) *Access Control Models - ANSWER monitors
and reports malicious events



14. Intrusion prevention (IPSes) *Access Control Models - ANSWER takes
actions when malicious events occur

, 15. Auditing *Access Control Models - ANSWER the examination and
review of an organizations records to ensure accountability through
technical means



16.Penetration testing *Access Control Models - ANSWER mimicking, as
closely as possible, the techniques an actual attack would use



17.Cryptography - ANSWER the practice of keeping infomation secure
through the use of codes and ciphers



18. Symmetric cryptography - ANSWER encryption that uses a single key to
encrypt and decrypt a message (aka the private key cryptography)



19. Block Cipher - ANSWER Takes a predetermined number of bits, known
as a block, in the plaintext message and encrypts that block



20. Stream Cipher - ANSWER Encrypts each bit in the plaintext message, 1
bit at a time



DES (Symmetric key algorithms) - ANSWER a block cipher based on symmetric
key crytography and uses a 56-bit key. Not that secured any more.



3DES (Symmetric key Algorithms) - ANSWER DES used to encrypt each block
three times, each with a different key

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EWLindy Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
710
Member since
3 year
Number of followers
431
Documents
7425
Last sold
2 days ago
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
3.8

107 reviews

5
55
4
13
3
16
2
6
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions