100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C725 OBJECTIVE ASSESSMENT FINAL MASTER'S COURSE INFORMATION SECURITY AND ASSURANCE/ WGU C725 OBJECTIVE ASSESSMENT FINAL EXAM PREPARATION WITH 300 REAL EXAM QUESTIONS AND CORRECT ANSWERS|AGRADE

Rating
-
Sold
4
Pages
52
Grade
A+
Uploaded on
21-02-2023
Written in
2022/2023

WGU C725 OBJECTIVE ASSESSMENT FINAL MASTER'S COURSE INFORMATION SECURITY AND ASSURANCE/ WGU C725 OBJECTIVE ASSESSMENT FINAL EXAM PREPARATION WITH 300 REAL EXAM QUESTIONS AND CORRECT ANSWERS|AGRADE An employee has worked for the same organization for years and still has access to legal files even though this employee now works in accounting. Which principle has been violated? - ANSWER- Least privilege A sales specialist is a normal user of a corporate network. The corporate network uses subjects, objects, and labels to grant users access. Which access control methodology is the corporation using? - ANSWER- Mandatory What is considered a valid method for testing an organization's disaster recovery plan, according to the Certified Information Systems Security Professional (CISSP)? - ANSWER- Checklist Who directs policies and procedures that are designed to protect information resources in an organization? - ANSWER- Information resources security officer

Show more Read less
Institution
WGU C725
Course
WGU C725











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C725
Course
WGU C725

Document information

Uploaded on
February 21, 2023
Number of pages
52
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c725

Content preview

WGU C725 TEST BANK 2023 MASTER'S COURSE
INFORMATION SECURITY AND ASSURANCE 2023 TEST
BANK 300 REAL EXAM QUESTIONS AND CORRECT
ANSWERS|AGRADE



An employee has worked for the same organization for years and still has access to
legal files even though this employee now works in accounting. Which principle
has been violated? - ANSWER- Least privilege

A sales specialist is a normal user of a corporate network. The corporate network
uses subjects, objects, and labels to grant users access. Which access control
methodology is the corporation using? - ANSWER- Mandatory

What is considered a valid method for testing an organization's disaster recovery
plan, according to the Certified Information Systems Security Professional
(CISSP)? - ANSWER- Checklist

Who directs policies and procedures that are designed to protect information
resources in an organization? - ANSWER- Information resources security officer

Which topics should be included in employee security training program? -
ANSWER- Social engineering, shoulder surfing, phishing, malware

What is a threat to business operations - ANSWER- Sophisticated hacking tools
purchased by a disgruntled employee

Which statement describes a threat? - ANSWER- Spear fishing attack

Which type of control reduces the effect of an attack? - ANSWER- Corrective

Which security control should be included in a risk management policy? -
ANSWER- Exception process

,The organization applies comprehensive hardening to all its computer assets. Due
to the high cost of accomplishing this, the security manager decides to withhold
any further spending on IT security for the remainder of the year. The manager
believes that because of the complexity and secrecy of the organization's security
configuration, these computer assets are relatively safe. Which flawed security
principle is the security manager relying on - ANSWER- Security through
obscurity

The company receives notification from its security monitoring service that an
unauthorized physical breach of its datacenter occurred. The perpetrator was able
to guess the correct code to the keypad device that controls access. Which type of
risk management control could have prevented this breach from occurring? -
ANSWER- Multifactor authentication



The company identifies a risk with an asset that has relatively low value. The cost
to secure the asset is $2 million. An insurance company will insure the loss of the
asset for $150,000 a year. The company decides not to take any action to protect
the asset. Which risk management strategy did the company choose to follow? -
ANSWER- 45

Acceptance

Which type of system controls preserves the state of the system before a crash and
prevents further damage or unauthorized access to a system? - ANSWER- Fail
secure

A software development company follows a process where software is moved from
the development environment, to the testing environment for quality assurance,
and then on to production. Which individual should be restricted from migrating
the software to the production environment? - ANSWER- Lead programmer

After an audit of user access, a CIO is concerned about improperly granted
permissions. Which type of user access should the CIO be most concerned with? -
ANSWER- Elevated

Which attack uses common words and phrases to guess passwords? - ANSWER-
Dictionary

,What is a disadvantage of discretionary access control (DAC)? - ANSWER-
Empowers owners to decide access levels

Which password problem persists when accessing information and systems even
with a strong password management and creation policy? - ANSWER- Passwords
are repudiable.

An organization wants to update its policies that govern email acceptable use,
internet acceptable use, laptop security, and wireless security. Which type of
policies should the organization update to accomplish this? - ANSWER- Issue
Specific

Which type of documents do organizations use to explain step-by-step
instructions? - ANSWER- Procedures

Data entry specialists at a hospital are only supposed to be able to enter new patient
records into the database but not be able to access existing records. Because the
permissions were not set correctly, some data entry specialists have been accessing
existing patient records and making unauthorized changes. Hospital administrators
want be able to easily grant permissions based on job type. Which security
principle should the organization implement to solve this problem? - ANSWER-
RBAC

A company was the victim of a phishing attack. This attack occurred because a
cybercriminal recovered employee company email addresses from a stolen laptop.
How should employee company email addresses be classified? - ANSWER-
Business sensitive

An accountant finds an error in the way interest is credited to customer accounts.
The IT department traces the error to a patch that IT put on the software used to
track customer accounts. The error cost the organization about $100,000 in
overpayments. What is the IT department's role in this case? - ANSWER-
Custodian

Which type of hypervisor installs directly onto the hardware where the host OS
would normally reside? - ANSWER- Type 1

Management is concerned that data will be lost when using virtual machines (VM).
What are two ways to preserve data in VMs? Choose 2 answers. - ANSWER- Full
and hypervisor updates

, Which type of investigation is completed internally and examines either
operational issues or a violation of the organization's policies? - ANSWER-
Administrative

Which two types of information about evidence are required to preserve the chain
of custody? - ANSWER- Relevant circumstances surrounding the collection of the
evidence



Name of the person collecting the evidenc

You must ensure that a complete inventory of your organization's assets is
maintained. Which components are necessary in the asset management inventory?

firmware versions
operating system versions
application versions
hardware devices installed - ANSWER- All the points

Question 2 :What is the primary function of portable storage media, such as Zip,
Jaz, and flash drives? - ANSWER- to exchange data

___________is the process of wiping out data from storage media to ensure that
the data is not recoverable and cannot be reused. - ANSWER- Sanitization

What defines the minimum level of security? - ANSWER- Baselines

Question 4 :As a security professional, you have been asked to determine the
appropriate retention policies for media, hardware, data, and personnel. You decide
to first document the appropriate data retention policies. Which of the following
statements is NOT true of developing these policies? - ANSWER- You should
work with data custodians to develop the appropriate data retention policy for each
type of data the organization owns.

You have been asked to provide scoping and tailoring guidance for an
organization's security controls. Which of the following guidelines is NOT true
regarding this process? - ANSWER- Scoping and tailoring are closely tied to
access control lists.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
johnkabiru Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
3253
Member since
3 year
Number of followers
2654
Documents
6543
Last sold
5 days ago
TopGrade Tutoring: Expert Psychology, Nursing, HR & Math Resources

Welcome to my academic support store, your trusted destination for top-tier homework help and tutoring services! Specializing in key subjects like Psychology, Nursing, Human Resource Management, and Mathematics, I’m dedicated to helping students excel with high-quality, meticulously crafted resources. My mission is to deliver scholarly, reliable content that guarantees excellent grades, earning me a reputation as one of Stuvia’s BEST GOLD RATED TUTORS. Whether you need assistance with quizzes, exams, or detailed study materials, I prioritize your success with a commitment to academic excellence and results you can count on.

Read more Read less
3.7

557 reviews

5
225
4
116
3
119
2
25
1
72

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions