100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C843 Managing Information Security: Final Exam Questions With Answers - Latest Graded A+ | 2023/2024 (VERIFIED)

Rating
-
Sold
-
Pages
37
Grade
A+
Uploaded on
08-08-2023
Written in
2023/2024

Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process. A True B False - ANSWER B One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. A False B True - ANSWER A What do audit logs that track user activity on an information system provide? A accountability B authentication C identification D authorization - ANSWER A A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. A False B True - ANSWER A Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? A Integrity B Availability C Authentication D Confidentiality - ANSWER D According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? A availability B authorization C authentication D accountability - ANSWER A ____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. A Spam B Worms C Viruses D Trojan horses - ANSWER D In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A sniff-in-the-middle B server-in-the-middle C man-in-the-middle D zombie-in-the-middle - ANSWER C A short-term interruption in electrical power availability is known as a ____. A blackout B lag C fault D brownout - ANSWER C The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. A False B True - ANSWER B Communications security involves the protection of which of the following?. A media, technology, and content B radio handsets C people, physical assets D the IT department - ANSWER A Which of the following is not among the 'deadly sins of software security'? A Extortion sins B Implementation sins C Web application sins D Networking sins - ANSWER A A worm may be able to deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. A True B False - ANSWER A Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization through a set of organizational guidelines? A policy B programs C people D planning - ANSWER A Ethics carry the sanction of a governing authority. A False B True - ANSWER A Which act is a collection of statutes that regulates the interception of wire, electronic, and oral communications? A Federal Privacy Act of 1974 B National Information Infrastructure Protection Act of 1996 C The Telecommunications Deregulation and Competition Act of 1996 D The Electronic Communications Privacy Act of 1986 - ANSWER D Which act requires organizations that retain health care information to use InfoSec mechanisms to protect this information, as well as policies and procedures to maintain them? A Sarbanes-Oxley B HIPAA C Gramm-Leach-Bliley D ECPA - ANSWER B Which of the following organizations put forth a code of ethics designed primarily for InfoSec professionals who have earned their certifications? The code includes the canon: Provide diligent and competent service to principals. A ISACA B (ISC)2 C ACM D SANS - ANSWER B The Secret Service is charged with the detection and arrest of any person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes. A True B False - ANSWER A Due diligence requires that an organization make a valid and ongoing effort to protect others. A False B True - ANSWER B It is the responsibility of InfoSec professionals to understand state laws and standards. A True B False - ANSWER B Which law extends protection to intellectual property, which includes words published in electronic formats? A U.S. Copyright Law B Security and Freedom through Encryption Act C Sarbanes-Oxley Act D Freedom of Information Act - ANSWER A Which of the following is the study of the rightness or wrongness of intentions and motives as opposed to the rightness or wrongness of the consequences and is also known as duty- or obligation-based ethics? A Normative ethics B Deontological ethics C Applied ethics D Meta-ethics - ANSWER B Which ethical standard is based on the notion that life in community yields a positive outcome for the individual, requiring each individual to contribute to that community? A utilitarian B virtue C fairness or justice D common good - ANSWER D Which law addresses privacy and security concerns associated with the electronic transmission of PHI? A National Information Infrastructure Protection Act of 1996 B Health Information Technology for Economic and Clinical Health Act C American Recovery and Reinvestment Act D USA Patriot Act of 2001 - ANSWER B Deterrence is the best method for preventing an illegal or unethical activity. A False B True - ANSWER B Which of the following is compensation for a wrong committed by an employee acting with or without authorization? A restitution B due diligence C jurisdiction D liability - ANSWER A Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right? A Descriptive ethics B Normative ethics C Deontological ethics D Applied ethics - ANSWER A Information ambiguation occurs when pieces of non-private data are combined to create information that violates privacy. A False B True - ANSWER A Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls. A persecution B rehabilitation C remediation D deterrence - ANSWER D

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 8, 2023
Number of pages
37
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYROOM2024 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
397
Member since
2 year
Number of followers
212
Documents
3947
Last sold
3 weeks ago

For all Nursing Test Banks visit my page. All Papers are Verified and Graded to Score A++ Wish you Success.

3.5

59 reviews

5
19
4
14
3
13
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions