WGU, Information Security and
Assurance (C725), SET I Exam 2026
Questions and Answers 100% Pass
Guaranteed
Information security is primarily a discipline to manage the behavior of _____.
A. Technology
B. People
C. Processes
D. Organizations - Correct answer-People
Careers in information security are booming because of which of the following
factors?
A. Threats of cyberterrorism
B. Government regulations
©COPYRIGHT 2025, ALL RIGHTS RESERVE 1
,C. Growth of the Internet
D. All of these - Correct answer-All of these
A program for information security should include which of the following
elements?
A. Security policies and procedures
B. Intentional attacks only
C. Unintentional attacks only
D. None of these - Correct answer-Security policies and proceduresExplanation:
Answer A is correct. The Carnegie Melon Information Network Institute (INI)
designed programs to carry out multiple tasks including Information Security
Policies.
The growing demand for InfoSec specialists is occurring predominantly in which
of the following types of organizations?
A. Government
B. Corporations
C. Not-for-profit foundations
D. All of these - Correct answer-D. All of these
©COPYRIGHT 2025, ALL RIGHTS RESERVE 2
,The concept of the measures used to ensure the protection of the secrecy of data,
objects, or resources. - Correct answer-Confidentiality
A catchall safe rating for any box with a lock on it. This rating describes the
thickness of the steel used to make the lockbox. No actual testing is performed to
gain this rating. - Correct answer-B-Rate Safe Rating
This safe rating is defined as a variably thick steel box with a 1-inch-thick door and
a lock. No tests are conducted to provide this rating, either. - Correct answer-C-
Rate Safe Rating
Safes with an Underwriters Laboratory rating that have passed standardized tests as
defined in Underwriters Laboratory Standard 687 using tools and an expert group
of safe-testing engineers. The safe rating label requires that the safe be constructed
of 1-inch solid steel or equivalent. The label means that the safe has been tested for
a net working time of 15 minutes using "common hand tools, drills, punches
hammers, and pressure applying devices." Net working time means that when the
tool comes off the safe, the clock stops. Engineers exercise more than 50 different
types of attacks that have proven effective for safecracking. - Correct answer-UL
TL-15 Safe Rating
This Underwriters Laboratory rating testing is essentially the same as the TL-15
testing, except for the net working time. Testers get 30 minutes and a few more
©COPYRIGHT 2025, ALL RIGHTS RESERVE 3
, tools to help them gain access. Testing engineers usually have a safe's
manufacturing blueprints and can disassemble the safe before the test begins to see
how it works. - Correct answer-UL TL-30 Safe Rating
Related to information security, confidentiality is the opposite of which of the
following?
A. Closure
B. Disclosure
C. Disaster
D. Disposal - Correct answer-B. Disclosure Explanation: Confidentiality models
are primarily intended to ensure that no unauthorized access to information is
permitted and that accidental disclosure of sensitive information is not possible.
Integrity models have which of the three goals:
A. Prevent unauthorized users from making modifications to data or programs
B. Prevent authorized users from making improper or unauthorized modifications
C. Maintain internal and external consistency of data and programs
©COPYRIGHT 2025, ALL RIGHTS RESERVE 4
Assurance (C725), SET I Exam 2026
Questions and Answers 100% Pass
Guaranteed
Information security is primarily a discipline to manage the behavior of _____.
A. Technology
B. People
C. Processes
D. Organizations - Correct answer-People
Careers in information security are booming because of which of the following
factors?
A. Threats of cyberterrorism
B. Government regulations
©COPYRIGHT 2025, ALL RIGHTS RESERVE 1
,C. Growth of the Internet
D. All of these - Correct answer-All of these
A program for information security should include which of the following
elements?
A. Security policies and procedures
B. Intentional attacks only
C. Unintentional attacks only
D. None of these - Correct answer-Security policies and proceduresExplanation:
Answer A is correct. The Carnegie Melon Information Network Institute (INI)
designed programs to carry out multiple tasks including Information Security
Policies.
The growing demand for InfoSec specialists is occurring predominantly in which
of the following types of organizations?
A. Government
B. Corporations
C. Not-for-profit foundations
D. All of these - Correct answer-D. All of these
©COPYRIGHT 2025, ALL RIGHTS RESERVE 2
,The concept of the measures used to ensure the protection of the secrecy of data,
objects, or resources. - Correct answer-Confidentiality
A catchall safe rating for any box with a lock on it. This rating describes the
thickness of the steel used to make the lockbox. No actual testing is performed to
gain this rating. - Correct answer-B-Rate Safe Rating
This safe rating is defined as a variably thick steel box with a 1-inch-thick door and
a lock. No tests are conducted to provide this rating, either. - Correct answer-C-
Rate Safe Rating
Safes with an Underwriters Laboratory rating that have passed standardized tests as
defined in Underwriters Laboratory Standard 687 using tools and an expert group
of safe-testing engineers. The safe rating label requires that the safe be constructed
of 1-inch solid steel or equivalent. The label means that the safe has been tested for
a net working time of 15 minutes using "common hand tools, drills, punches
hammers, and pressure applying devices." Net working time means that when the
tool comes off the safe, the clock stops. Engineers exercise more than 50 different
types of attacks that have proven effective for safecracking. - Correct answer-UL
TL-15 Safe Rating
This Underwriters Laboratory rating testing is essentially the same as the TL-15
testing, except for the net working time. Testers get 30 minutes and a few more
©COPYRIGHT 2025, ALL RIGHTS RESERVE 3
, tools to help them gain access. Testing engineers usually have a safe's
manufacturing blueprints and can disassemble the safe before the test begins to see
how it works. - Correct answer-UL TL-30 Safe Rating
Related to information security, confidentiality is the opposite of which of the
following?
A. Closure
B. Disclosure
C. Disaster
D. Disposal - Correct answer-B. Disclosure Explanation: Confidentiality models
are primarily intended to ensure that no unauthorized access to information is
permitted and that accidental disclosure of sensitive information is not possible.
Integrity models have which of the three goals:
A. Prevent unauthorized users from making modifications to data or programs
B. Prevent authorized users from making improper or unauthorized modifications
C. Maintain internal and external consistency of data and programs
©COPYRIGHT 2025, ALL RIGHTS RESERVE 4