100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU Course C836 - Fundamentals of Information Security updated 2024.

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
06-11-2024
Written in
2024/2025

______ ensures the protection of information, operations, and assets in federal government. A SOX B PCI DSS C FERPA D HIPAA E FISMA - ANSWER-E ______ protects the customers of financial institutions. A PCI DSS B SOX C FISMA D FERPA E GLBA - ANSWER-E ______ protects the privacy of students and their parents. A PCI DSS B FISMA C HIPAA D GLBA E FERPA - ANSWER-E ______ regulates the financial practice and governance of corporations. A FERPA B HIPAA C GLBA D FISMA E SOX - ANSWER-E ______ sets limits on the use and disclosure of patient information and grants individuals rights over their own health records. A HIPAA B SOX C GLBA D FERPA E PCI DSS - ANSWER-A ________ protects the privacy of students and their parents. Also grants certain rights to students and parents regarding the student's own records. - ANSWER-The Family Educational Rights and Privacy Act (FERPA) ________ provides a framework for ensuring the effectiveness of information security controls in government. This legislation is intended to protect government information, operations, and assets from any natural or manmade threat. This requires each federal agency to develop, document, and implement an information security program to protect its information and information systems. - ANSWER-The Federal Information Security Modernization Act (FISMA) __________ requires privacy protections for individually identifiable health information, also known as protected health information, or PHI. - ANSWER-Health Insurance Portability and Accountability Act (HIPAA) ___________ attacks cause our assets to become unusable or unavailable for our use, on a temporary or permanent basis. These attacks affect ____________, such as a DDOS attack, but can be an attack on integrity as well. - ANSWER-Interruption; Availability ___________ protects the customers of financial institutions, essentially any company offering financial products or services, financial or investment advice, or insurance. Requires financial institutions to safeguard a consumer's "nonpublic personal information," or NPI - ANSWER-The Gramm-Leach-Bliley Act (GLBA) ___________ provides us with the means to trace activities in our environment back to their source. A Accountability B Authentication C Access D Nonrepudiation E Authorization - ANSWER-A _____________ are based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature. An example is one that requires us to change our password every 90 days. One important concept when we discuss this type of control is the ability to enforce compliance with them. If we do not have the authority or the ability to ensure that our controls are being complied with, they are worse than useless, because they create a false sense of security. - ANSWERAdministrative Controls _____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources. A Hping3 B NetStumbler C Wireshark D Kismet - ANSWER-C

Show more Read less
Institution
C836
Course
C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836
Course
C836

Document information

Uploaded on
November 6, 2024
Number of pages
46
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU Course C836 - Fundamentals of
Information Security updated 2024.

______ ensures the protection of information, operations, and assets in federal government.



A SOX

B PCI DSS

C FERPA

D HIPAA

E FISMA - ANSWER-E



______ protects the customers of financial institutions.



A PCI DSS

B SOX

C FISMA

D FERPA

E GLBA - ANSWER-E



______ protects the privacy of students and their parents.



A PCI DSS

B FISMA

C HIPAA

D GLBA

E FERPA - ANSWER-E



______ regulates the financial practice and governance of corporations.

,A FERPA

B HIPAA

C GLBA

D FISMA

E SOX - ANSWER-E



______ sets limits on the use and disclosure of patient information and grants individuals rights over
their own health records.



A HIPAA

B SOX

C GLBA

D FERPA

E PCI DSS - ANSWER-A



________ protects the privacy of students and their parents. Also grants certain rights to students
and parents regarding the student's own records. - ANSWER-The Family Educational Rights and
Privacy Act (FERPA)



________ provides a framework for ensuring the effectiveness of information security controls in
government. This legislation is intended to protect government information, operations, and assets
from any natural or manmade threat. This requires each federal agency to develop, document, and
implement an information security program to protect its information and information systems. -
ANSWER-The Federal Information Security Modernization Act (FISMA)



__________ requires privacy protections for individually identifiable health information, also known
as protected health information, or PHI. - ANSWER-Health Insurance Portability and Accountability
Act (HIPAA)



___________ attacks cause our assets to become unusable or unavailable for our use, on a
temporary or permanent basis. These attacks affect ____________, such as a DDOS attack, but can
be an attack on integrity as well. - ANSWER-Interruption; Availability



___________ protects the customers of financial institutions, essentially any company offering
financial products or services, financial or investment advice, or insurance. Requires financial

,institutions to safeguard a consumer's "nonpublic personal information," or NPI - ANSWER-The
Gramm-Leach-Bliley Act (GLBA)



___________ provides us with the means to trace activities in our environment back to their source.



A Accountability

B Authentication

C Access

D Nonrepudiation

E Authorization - ANSWER-A



_____________ are based on rules, laws, policies, procedures, guidelines, and other items that are
"paper" in nature. An example is one that requires us to change our password every 90 days. One
important concept when we discuss this type of control is the ability to enforce compliance with
them. If we do not have the authority or the ability to ensure that our controls are being complied
with, they are worse than useless, because they create a false sense of security. - ANSWER-
Administrative Controls



_____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety
of wired and wireless sources.



A Hping3

B NetStumbler

C Wireshark

D Kismet - ANSWER-C



_____________ is a sniffer that specializes in detecting wireless devices.



A Kismet

B Wireshark

C NetStumbler

D Hping3 - ANSWER-A

, _____________ is the next step taken after we have completed identification and authentication. -
ANSWER-Authorization



_____________ regulates the financial practice and governance of corporations and is designed to
protect investors and the general public by establishing requirements regarding reporting and
disclosure practices. - ANSWER-The Sarbanes-Oxley Act (SOX)



______________ attacks allow unauthorized users to access our data, applications, or environments,
and are primarily an attack against _______________ of the CIA triad. The form of unauthorized file
viewing or copying, eavesdropping on phone conversations, or reading e-mail, and can be conducted
against data at rest or in motion. - ANSWER-Interception; Confidentiality



_______________ attacks involve tampering with our asset. Such attacks might primarily be
considered an ______________ attack but could also represent an availability attack. If we access a
file in an unauthorized manner and alter the data it contains, we have affected the integrity of the
data contained in the file. However, if we consider the case where the file in question is a
configuration file that manages how a particular service behaves, perhaps one that is acting as a Web
server, we might affect the availability of that service by changing the contents of the file. - ANSWER-
Modification; Integrity



________________ is a web-related technology used to develop web pages while ____________
refers to an attack where malicious code is embedded into the web page. - ANSWER-CSS; XSS



___________________ attacks involve generating data, processes, communications, or other similar
activities with a system. Primarily affects ____________ but could be considered an availability
attack as well. - ANSWER-Fabrication; Integrity



_____________controls, are those that protect the systems, networks, and environments that
process, transmit, and store our data. Common examples are: passwords, encryption, logical access
controls, firewalls, and intrusion detection systems. - ANSWER-Logical and Technical Controls



1 - Identification

2 - Authentication

3 - Authorization

4 - Access - ANSWER-Accountability



1 - Preparation
$23.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
aliciabernado2001

Get to know the seller

Seller avatar
aliciabernado2001 Columbia International University
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
89
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions