100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C725 Exam Practice Questions With Answers Latest Update 2023/2024 | 100% Correct

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
16-09-2023
Written in
2023/2024

WGU C725 Exam Practice Questions With Answers Latest Update 2023/2024 | 100% Correct. An attacker accesses private emails between the company's CISO and board members. The attacker then publishes the emails online. Which type of an attack is this, according to the STRIDE model?:  Information disclosure WGU C725 Practice Test Questions With Answers | Latest Update 2023/2024 Graded 100% 2 / 14 5. A system data owner needs to give access to a new employee, so the owner formally requests that the system administrator create an account and permit the new employee to use systems necessary to the job. Which type of control does the system administrator use to grant these permissions?: Access 6. The chief information security officer (CISO) for an organization knows that the organization's datacenter lacks the physical controls needed to adequately control access to sensitive corporate systems. The CEO, CIO, and CFO feel that the current physical access is within a tolerable risk level, and they agree not to pay for upgrades to the facility. Which risk management strategy has the senior leadership decided to employ?: Acceptance 7. Which phase of the software development life cycle follows system design?-: Development 8. Which question relates to the functional aspect of computer security?: Does the system do the right things in the right way? 9. Which action is an example of a loss of information integrity based on the CIA triad?: A security engineer accidentally scrambles information in a database. 10. What is included in quantitative risk analysis?: Risk ranking 3 / 14 11. What is a fundamentally objective concept in determining risk?: Resource costs 12. Which domain of the (ISC)² Common Body of Knowledge addresses procedures and tools that eliminate or reduce the capability to exploit critical information?: Operations Security 4 / 14 13. Which domain of the (ISC)² Common Body of Knowledge addresses identification, authentication, authorization, and logging and monitoring techniques and technologies?: Access Control 14. Which type of policy establishes a security plan, assigns managementresponsibilities, and states an organization's computer security objectives?- : Program-level 15. A company consults a best practices manual from its vendor while deploying a new IT system. Which type of document does this exemplify?: Guidelines 16. An organization has all of its offices in several different buildings that are situated on a large city block. Which type of network is specifically suited to connect these offices to the organization's network: Campus 17. A network security engineer is tasked with preparing audit reports for the auditor. The internal auditor sends the reports to the external auditor who discovers that fraud was committed and that the network security engineer has falsified the reports. Which security principle should be used to stop this type of fraud from happening?: Separation of duties 18. An employee has worked for the same organization for years and still has access to legal files even though this employee now works in accounting. Which principle has been violated?: Least privilege 5 / 14 19. A sales specialist is a normal user of a corporate network. The corporate network uses subjects, objects, and labels to grant users access. Which access control methodology is the corporation using?: Mandatory 20. What is considered a valid method for testing an organization's disaster recovery plan, according to the Certified Information Systems Security Professional (CISSP)?: Checklist 21. Who directs policies and procedures that are designed to protect information resources in an organization?: Information resources security officer 22. Which topics should be included in employee security training program?- : Social engineering, shoulder surfing, phishing, malware 23. What is a threat to business operations: Sophisticated hacking tools purchased by a disgruntled employee 24. Which statement describes a threat?: Spear fishing attack 25. Which type of control reduces the effect of an attack?: Corrective 26. Which security control should be included in a risk management policy?- : Exception process 27. The organization applies comprehensive hardening to all its computer assets. Due to the high cost of accomplishing this, the security manager decides to withhold any further spending on IT security for the remainder of 6 / 14 the year. The manager believes that because of the complexity and secrecy of 7 / 14 the organization's security configuration, these computer assets are relatively safe. Which flawed security principle is the security manager relying on: Security through obscurity 28. The company receives notification from its security monitoring service that an unauthorized physical breach of its datacenter occurred. The perpetrator was able to guess the correct code to the keypad device that controls access. Which type of risk management control could have prevented this breach from occurring?: Multifactor authentication 29. 45 The company identifies a risk with an asset that has relatively low value. The cost to secure the asset is $2 million. An insurance company will insure the loss of the asset for $150,000 a year. The company decides not to take any action to protect the asset. Which risk management strategy did the company choose to follow?: 45 Acceptance 30. Which type of system controls preserves the state of the system before a crash and prevents further damage or unauthorized access to a system?: Fail 8 / 14 secure 31. A software development company follows a process where software is moved from the development environment, to the testing environment for quality assurance, and then on to production. Which individual should be restricted from migrating the software to the production environment?: Lead programmer 32. After an audit of user access, a CIO is concerned about improperly granted permissions. Which type of user access should the CIO be most concerned with?: Elevated 33. Which attack uses common words and phrases to guess passwords?: Dictionary 34. What is a disadvantage of discretionary access control (DAC)?: Empowers owners to decide access levels 35. Which password problem persists when accessing information and systems even with a strong password management and creation policy?: Passwords are repudiable. 36. An organization wants to update its policies that govern email acceptable use, internet acceptable use, laptop security, and wireless security. Which typeof policies should the organization update to accomplish this?

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 16, 2023
Number of pages
30
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExcelAcademia2026 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2055
Member since
4 year
Number of followers
1648
Documents
7341
Last sold
1 day ago
EXCEL ACADEMIA TUTORS

At Excel Academia Tutoring, You will get solutions to all subjects in both assignments and major exams. Contact me for assistance. Good luck! Well-researched education materials for you. Expert in Nursing, Mathematics, Psychology, Biology etc. My Work has the Latest & Updated Exam Solutions, Study Guides and Notes (100% Verified Solutions that Guarantee Success)

3.7

335 reviews

5
138
4
74
3
62
2
19
1
42

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions