WGU C795- Cybersecurity Management II (Tactical) |Questions & Answers| Already Graded A+ | 2024
WGU C795- Cybersecurity Management II (Tactical) |Questions & Answers| Already Graded A+ | 2024 What is a vulnerability? Correct Answer-a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. What is a penetration test? Correct Answer-a simulated cyber attack against your systems or company What are the typical steps for a vulnerability test? Correct Answer-Identify asset classification list, identify vulnerabilities, test assets against vulnerabilities, and recommend solutions to either eliminate or mitigate vulnerabilities What is the first thing an organization should do before defining security requirements? Correct Answer-To define security requirements, first an organization must define its risk appetite. What is defense in depth? Correct Answer-defense-in-depth principle; it is by adding relevant layer of controls (e.g., access control, encryption, and monitoring) that the expected level of protection is achieved. What are COTS applications? Correct Answer-Applications developed by vendors and installed on the organization's information systems. These applications are usually purchased outright by organizations with usage based on licensing agreements. What are SaaS applications? Correct Answer-Applications developed by service providers or vendors and installed on the provider or vendor information system. Organizations typically have an on-demand or pay-per-usage metrics
Written for
- Institution
-
Western Governers University
- Course
-
WGU C795
Document information
- Uploaded on
- October 23, 2023
- Number of pages
- 18
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c795 cybersecurity management ii tactical
Also available in package deal