WGU C725 Information Security and Assurance | Questions with 100% Correct Answers | Verified | Latest Update
Which two passwords are the weakest? Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - Love@$MySon80 Password1234 Which groups typically report to the chief security officer (CSO)? - Security engineering and operations What is the formula for computing single loss expectancy - SLE = AV x EF [Single Loss Expectancy = Asset Value x Exposure Factor] A violation of the "separation of duties" principle arises when the security systems software is accessed by which of the following individuals? - Systems programmer An example of the separation of duties of a computer operation is when a company has one environment for the software developers, another for quality assurance testing, and a third for production, or the environment that end users access, to perform their duties. As software is deemed ready, it is promoted from environment to environment by systems and security
Written for
- Institution
-
Western Governors University
- Course
-
WGU C725
Document information
- Uploaded on
- June 18, 2023
- Number of pages
- 7
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c725 information security and assurance | ques
Also available in package deal