WGU C725 TEST BANK 2025 MASTER'S COURSE INFORMATION
SECURITY AND ASSURANCE 2025 TEST BANK REAL EXAM
QUESTIONS AND CORRECT ANSWERS AGRADE
Requires corporate executives to review and modernize their company's financial reporting
systems. - (ANSWER)SOX (Sarbanes-Oxley Act)
Known as the Financial Modernization Act of 1999. It is a United States federal law that requires
financial institutions to explain how they share and protect their customers' private information.
To be GLBA compliant, financial institutions must communicate to their customers how they
share the customers' sensitive data, inform customers of their right to opt-out if they prefer that
their personal data not be shared with third parties. - (ANSWER)GLBA (Gramm-Leach-Bliley
Act)
Overwriting
Deguassing
Destruction - (ANSWER)What are the three methods of sanitization?
Uses security labels for access control. Highly restrictive, usually used within government
agencies. E.g. TS, SCI, etc. - (ANSWER)Mandatory Access Control (MAC)
A means of restricting access to objects based on the identity of subjects and/or groups to which
they belong. - (ANSWER)Discretionary Access Control (DAC)
Passwords can be insecure, and easily broken. Dictionary words are not advised. Passwords are
inconvenient, and repudiable. - (ANSWER)What are the problems with passwords?
Remote Access Dial-In User Service; client/server protocol and software that enables remote
access users to communicate with a central server to authenticate dial-in users and authorize their
access to the requested system or service. - (ANSWER)RADIUS
SECURITY AND ASSURANCE 2025 TEST BANK REAL EXAM
QUESTIONS AND CORRECT ANSWERS AGRADE
Requires corporate executives to review and modernize their company's financial reporting
systems. - (ANSWER)SOX (Sarbanes-Oxley Act)
Known as the Financial Modernization Act of 1999. It is a United States federal law that requires
financial institutions to explain how they share and protect their customers' private information.
To be GLBA compliant, financial institutions must communicate to their customers how they
share the customers' sensitive data, inform customers of their right to opt-out if they prefer that
their personal data not be shared with third parties. - (ANSWER)GLBA (Gramm-Leach-Bliley
Act)
Overwriting
Deguassing
Destruction - (ANSWER)What are the three methods of sanitization?
Uses security labels for access control. Highly restrictive, usually used within government
agencies. E.g. TS, SCI, etc. - (ANSWER)Mandatory Access Control (MAC)
A means of restricting access to objects based on the identity of subjects and/or groups to which
they belong. - (ANSWER)Discretionary Access Control (DAC)
Passwords can be insecure, and easily broken. Dictionary words are not advised. Passwords are
inconvenient, and repudiable. - (ANSWER)What are the problems with passwords?
Remote Access Dial-In User Service; client/server protocol and software that enables remote
access users to communicate with a central server to authenticate dial-in users and authorize their
access to the requested system or service. - (ANSWER)RADIUS