100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C725 FINAL EXAM QUESTIONS AND ANSWERS 2024

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
29-09-2024
Written in
2024/2025

WGU C725 FINAL EXAM QUESTIONS AND ANSWERS 2024

Institution
WGU C725
Course
WGU C725











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C725
Course
WGU C725

Document information

Uploaded on
September 29, 2024
Number of pages
46
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C725 FINAL EXAM

Using Alternate Sites - ANSWERS-In this agreement The vendor is responsible for
providing backup services if the company experiences a critical failure in its
systems.



Hot-Site - ANSWERS-Facility assumes the entire burden of providing backup
computing services for the customer. Uninterrupted service in a relatively quick
time. Most expensive solution.



Security Risk - data is now stored, backed up and theoretically accessible to a third
party.



Cold-Site - ANSWERS-Provides facilities necessary to run a data processing center.
Does not have any of the hardware or software. Customer must deliver the
hardware and software.



Warm-Site - ANSWERS-Provides the building and environmental services, with
addition to hardware and communication links already established.



The customer applications are not installed, nor are workstations provided.



Service Bureaus - ANSWERS-Provide backup processing services at a remote
location. Quick response but high cost. Perform primary application processing
such as payroll systems and have extra capacity for DRP services.

,Mobile Units - ANSWERS-third-party vendor provides a data processing center on
wheels, air conditioning and power system



The Cloud - ANSWERS-Virtualized storage of applications and their data, the
customer finds its data backed up and available for immediate recovery



Multiple centers - ANSWERS-Processing is distributed across multiple centers that
are in-house or part of a shared site agreement.



Walk-throughs - ANSWERS-Method of testing the DRP members of the key
business units meet to trace their steps through the plan, looking for omissions
and inaccuracies



Simulations - ANSWERS-Method of testing the DRP Critical personnel meet to
perform a dry run of the emergency, mimicking the response to a true emergency
as closely as possible.



Checklists - ANSWERS-Method of testing the DRP a more passive type of testing,
members of departments check off the tasks for which they are responsible for



Parallel testing - ANSWERS-Method of testing the DRP the backup processing
occurs in parallel with production services that never stop.

,Full interruption - ANSWERS-Method of testing the DRP True/False test,
production systems are stopped as if a disaster occurred to see how the backup
services perform.



Military and Intelligence attacks - ANSWERS-What type of attack is criminals and
intelligence agents illegally obtain classified and sensitive military information and
police files.



Business attacks - ANSWERS-Increasing competition between companies
frequently leads to illegal access of proprietary information



Financial Attacks - ANSWERS-Banks and other financial institutions provide
attractive targets for computer criminals



Grudge Attacks - ANSWERS-Companies are increasingly wary of disgruntled
employees who feel mistreated and exact their revenge using computer systems



Thrill Attacks - ANSWERS-Hack computer systems for the fun of it, for bragging
rights, or simply for a challenge



Rouge Code - ANSWERS-What type of computer crime the user inadvertently
launches software that can log a user's keystrokes and either send them to a
remote server or perform other undesirable activities such as deleting files or
destroying OS

, Dumpster Diving - ANSWERS-What type of computer crime no-tech criminal
technique is the primary cause of ID theft. Criminal digs through trash



Spoofing of Internet Protocol Addresses - ANSWERS-What type of computer crime
the attacker sends a message with a false originating IP address to convince the
recipient that the sender is someone else. Masquerades as a legitimate Internet
site by using that site's IP address



Confidentiality - ANSWERS-Referred to as Least privileged -users should be given
only enough privilege to perform their duties, and no more. ensure that no
unauthorized access to information is permitted and that accidental disclosure of
sensitive information is not possible.



Integrity - ANSWERS-Keep data pure and trustworthy by protecting system data
from intentional or accidental changes.



Prevent unauthorized users from making modifications to data or programs



Prevent authorized users from making improper or unauthorized modifications



Maintain internal and external consistency of data and programs



Availability - ANSWERS-Keep data and resources available for authorized use,
especially during emergencies or disasters.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Teacher101 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
391
Member since
1 year
Number of followers
71
Documents
9196
Last sold
5 hours ago

Quality is my middle name.....100% ...my policy is to create and nurture people of quality by continuous education and training.....i guaranteed good grades 100% Feel free to get in touch through inbox...anything regarding help or issue with the exams posted... Finally after purchase please leave a good rating if satisfied with my work.... All the best as we continue working to improve ourselves through education

4.6

265 reviews

5
217
4
14
3
24
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions