100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C725 Master's Course Information Security and Assurance Exam Questions and Answers Latest 2023 – 2024

Rating
-
Sold
-
Pages
49
Grade
A+
Uploaded on
13-09-2023
Written in
2023/2024

WGU C725 Master's Course Information Security and Assurance Exam Questions and Answers Latest 2023 – 2024. Which two passwords are the weakest? A. Pa$$w0Rd%^78 B. Love@$MySon80 C. C@1Il@VEm1 D. Password1234 - answer-BD Which two secure methods should be used to keep track of passwords? A. Encrypt text files of them on the user's workstation B. Store them on a sticky note in a convenient spot C. Share them with a trusted manager or coworker D. Organization-approved password storage software - answer-AD Which groups typically report to the chief security officer (CSO)? A. Security engineering and operations B. Physical and software security C. Audit and incident response D. Facilities and information technology functions - answer-A A company is considering which controls to buy to protect an asset. What should the price of the controls be in relation to the cost of the asset? WGU C725 Master's Course Information Security and Assurance Exam Questions and Answers Latest 2023 – 2024 A. Less than the annual loss expectancy B. More than the annual loss expectancy C. Equal to the cost of the asset D. More than the cost of the asset - answer-A How many keys are used in asymmetric encryption? A. No keys are used to encrypt and decrypt a message. B. One key is used to encrypt and decrypt a message. C. Two keys are used to encrypt and decrypt a message. D. Three keys are used to encrypt and decrypt a message. - answer-C Which protocol is a variant of a standard web transfer protocol that adds a layer of security on the data in transit using a secure socket layer? A. HTTPS B. HTTP C. FTP D. SFTP - answer-A Which description characterizes symmetric cryptography? A. The same key is used to lock and unlock the cipher. B. Two separate but unrelated keys are used to unlock the cipher. C. Two separate and related keys are used to unlock the cipher. D. Keys are unnecessary when using symmetric cryptography to unlock a cipher. - answer-A An employee uses a secure hashing algorithm for message integrity. The employee sends a plain text message with the embedded hash to a colleague. A rogue device receives and retransmits the message to its destination. Once received and checked by the intended recipient, the hashes do not match. Which STRIDE concept has been violated? A. Tampering B. Repudiation C. Elevation of privilege D. Denial-of-service - answer-A An attacker accesses private emails between the company's CISO and board members. The attacker then publishes the emails online. Which type of an attack is this, according to the STRIDE model? A. Repudiation B. Information disclosure C. Elevation of privilege D. Tampering - answer-B A security guard at the front desk of a building checks every employee's name badge with their photo before they are allowed in the building. Which two factors have been checked to verify identity? A. Something you have, something you are B. Something you have, something you know C. Something you know, where you are at D. Where you are at, something you are - answer-A A system data owner needs to give access to a new employee, so the owner formally requests that the system administrator create an account and permit the new employee to use systems necessary to the job. Which type of control does the system administrator use to grant these permissions? A. Physical B. Protocol C. Access D. Firewall - answer-C The chief information security officer (CISO) for an organization knows that the organization's datacenter lacks the physical controls needed to adequately control access to sensitive corporate systems. The CEO, CIO, and CFO feel that the current physical access is within a tolerable risk level, and they agree not to pay for upgrades to the facility. Which risk management strategy has the senior leadership decided to employ? WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) A. Deterrence B. Assignment C. Acceptance D. Avoidance - answer-C Which phase of the software development life cycle follows system design? A. System requirements B. Development C. Testing D. Deployment - answer-B Which question relates to the functional aspect of computer security? A. Does the system do the right things in the right way? B. Does the security staff do the right job in the right way? C. Does the system do the right things in the wrong way? D. Does the security staff do the right job in the wrong way? - answer-A Which leg of the CIA triad is addressed when a business contracts with a cloud vendor to backup its information? A. Information WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) B. Availability C. Integrity D. Confidentiality - answer-B Which action is an example of a loss of information integrity based on the CIA triad? A. A system administrator uses another administrator's password without request. B. A security engineer accidentally scrambles information in a database. C. A help desk employee verifies customers' identities before changing passwords. D. A help desk employee refuses to share an employee's information with a partner. - answer-B What is included in quantitative risk analysis? A. Risk ranking B. Risk mitigation C. Risk transfer D. Risk insurance - answer-A What is a fundamentally objective concept in determining risk? A. Risk acceptance B. Risk recovery C. Resource availability D. Resource costs - answer-D WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) Which domain of the (ISC)² Common Body of Knowledge addresses procedures and tools that eliminate or reduce the capability to exploit critical information? A. Physical (Enviromental) Security B. Access Control C. Operations Security D. Cryptography - answer-C Which domain of the (ISC)² Common Body of Knowledge addresses identification, authentication, authorization, and logging and monitoring techniques and technologies? A. Access Control B. Operations Security C. Cryptography D. Software Development Security - answer-A Which type of policy establishes a security plan, assigns management responsibilities, and states an organization's computer security objectives? A. Framework-level B. Program-level C. System-specific D. Issue-specific - answer-B WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) A company consults a best practices manual from its vendor while deploying a new IT system.Which type of document does this exemplify? A. Procedures B. Guidelines C. Policies D. Standards - answer-B Which type of technology are DropBox, Skype, and Office 365 examples of? A. Local Area Network B. Wireless C. Wide Area Network D. Cloud Computing - answer-D An organization has all of its offices in several different buildings that are situated on a large city block. Which type of network is specifically suited to connect these offices to the organization's network? A. Wireless B. Campus C. Metropolitan D. Wide - answer-B WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) A new bookkeeper receives an email claiming to come from an online banking site. The bookkeeper clicks on an embedded link and enters some of the company's banking information into the cybercriminal's website. Which security method can deter this type of attack in the future? A. Employee security training B. Principle of least privilege C. Change management D. Separation of duties - answer-A A network security engineer is tasked with preparing audit reports for the auditor. The internal auditor sends the reports to the external auditor who discovers that fraud was committed and that the network security engineer has falsified the reports. Which security principle should be used to stop this type of fraud from happening? A. Separation of duties B. Least privilege C. Network segmentation D. Defense in depth - answer-A An employee has worked for the same organization for years and still has access to legal files even though this employee now works in accounting. Which principle has been violated? WGU C725 Master's Course Information Security and Assurance Exam (Latest 2023 – 2024) A. Least privilege B. Network segmentation C. Separation of duties D. Defense in depth - answer-A A sales specialist is a normal user of a corporate network. The corporate network uses subjects, objects, and labels to grant users access. Which access control methodology is the corporation using? A. Least privilege B. Discretionary C. Role-based D. Mandatory - answer-D Which description is an example of three-factor authentication? A. Unique information related to the user is added to the two-factor authentication process. B. A user has three physical devices such as a token, a smart card, and a USB flash drive. C. A user must enter a strong password, enter a mantrap, and then reenter the password. D. Unique information related to the user is necessary in addition to a strong password. - answer-A What is considered a valid method for testing an organization's disaster recovery plan, according to the Certified Information Systems Security Professional (CISSP)?

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 13, 2023
Number of pages
49
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c725
  • c725
  • latest 2023 2024

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SOLUTIONS2024 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
906
Member since
3 year
Number of followers
696
Documents
5458
Last sold
5 days ago
ALPHA STUDY CENTRE.

Alpha Academy is a dedicated study centre where you will find QUALITY & RELIABLE study resources that will help you prepare, revise and pass your examinations for all majors and modules in real TIME.. Good Luck from ALPHA ACADEMY.

3.7

180 reviews

5
91
4
26
3
19
2
7
1
37

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions