100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

WGU C725 - Information Security and Assurance Study Guide

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
05-09-2025
Written in
2025/2026

WGU C725 - Information Security and Assurance Study Guide This guide breaks down the core domains of the C725 course into digestible sections with over 100 key concepts presented as questions and answers. Domain 1: Foundational Security Concepts 1. What is the core objective of Information Security (InfoSec)?  ANSWER To protect the confidentiality, integrity, and availability of information and information systems, known as the CIA Triad. 2. Define Confidentiality.  ANSWER The principle of ensuring that information is not disclosed to unauthorized individuals, processes, or devices. (e.g., Encryption, access controls). 3. Define Integrity.  ANSWER The principle of guarding against improper information modification or destruction to ensure information non-repudiation and authenticity. (e.g., Hashing, digital signatures). 4. Define Availability.  ANSWER The principle of ensuring timely and reliable access to and use of information for authorized users. (e.g., Redundancy, fault tolerance, backups). 5. What is Non-repudiation?  ANSWER A security service that provides proof of the origin and integrity of data, preventing a party from denying having sent a message or performed an action. (e.g., Digital signatures). 6. What is the difference between a Threat, a Vulnerability, and a Risk?  ANSWER A Threat is any potential danger to an asset. A Vulnerability is a weakness in a system that can be exploited by a threat. Risk is the likelihood that a threat will exploit a vulnerability and the resulting impact. 7. What is the purpose of a Risk Assessment?  ANSWER To identify, estimate, and prioritize risks to organizational operations, assets, and individuals. 8. What are the four common Risk Response strategies?  ANSWER Acceptance (acknowledge the risk), Avoidance (stop the activity causing the risk), Mitigation (implement controls to reduce the risk), Transference (shift the risk to a third party, e.g., insurance). 9. What is the principle of Least Privilege?  ANSWER Granting users only the minimum levels of access—or permissions— necessary to perform their job functions. 10. What is Defense in Depth (Layered Defense)?  ANSWER A security strategy that employs multiple, layered defensive mechanisms to protect assets. If one mechanism fails, another steps up. (e.g., Firewall, IPS, antivirus, user training).

Show more Read less
Institution
WGU C725
Course
WGU C725









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C725
Course
WGU C725

Document information

Uploaded on
September 5, 2025
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C725 - Information Security and Assurance Study Guide
This guide breaks down the core domains of the C725 course into digestible sections
with over 100 key concepts presented as questions and answers.

Domain 1: Foundational Security Concepts

1. What is the core objective of Information Security (InfoSec)?

 ANSWER ✓ To protect the confidentiality, integrity, and availability of information and
information systems, known as the CIA Triad.

2. Define Confidentiality.

 ANSWER ✓ The principle of ensuring that information is not disclosed to unauthorized
individuals, processes, or devices. (e.g., Encryption, access controls).

3. Define Integrity.

 ANSWER ✓ The principle of guarding against improper information modification or
destruction to ensure information non-repudiation and authenticity. (e.g., Hashing,
digital signatures).

4. Define Availability.

 ANSWER ✓ The principle of ensuring timely and reliable access to and use of
information for authorized users. (e.g., Redundancy, fault tolerance, backups).

5. What is Non-repudiation?

 ANSWER ✓ A security service that provides proof of the origin and integrity of data,
preventing a party from denying having sent a message or performed an action. (e.g.,
Digital signatures).

6. What is the difference between a Threat, a Vulnerability, and a Risk?

 ANSWER ✓ A Threat is any potential danger to an asset. A Vulnerability is a weakness
in a system that can be exploited by a threat. Risk is the likelihood that a threat will
exploit a vulnerability and the resulting impact.

7. What is the purpose of a Risk Assessment?

,  ANSWER ✓ To identify, estimate, and prioritize risks to organizational operations, assets,
and individuals.

8. What are the four common Risk Response strategies?

 ANSWER ✓ Acceptance (acknowledge the risk), Avoidance (stop the activity causing
the risk), Mitigation (implement controls to reduce the risk), Transference (shift the risk
to a third party, e.g., insurance).

9. What is the principle of Least Privilege?

 ANSWER ✓ Granting users only the minimum levels of access—or permissions—
necessary to perform their job functions.

10. What is Defense in Depth (Layered Defense)?

 ANSWER ✓ A security strategy that employs multiple, layered defensive mechanisms to
protect assets. If one mechanism fails, another steps up. (e.g., Firewall, IPS, antivirus, user
training).




Domain 2: Security Governance and Compliance

11. What is a Security Policy?

 ANSWER ✓ A formal, high-level document that defines an organization's security goals,
culture, and expectations for secure behavior. It is mandatory.

12. What is the difference between a Standard, a Guideline, and a Procedure?

 ANSWER ✓ A Standard is a mandatory rule supporting a policy. A Guideline is a
recommended, non-mandatory action. A Procedure is a detailed, step-by-step
instruction for accomplishing a specific task.

13. What are the three main types of security controls?

 ANSWER ✓ Administrative (policies, procedures), Technical (firewalls, encryption),
and Physical (locks, guards).

14. What is the purpose of a Business Impact Analysis (BIA)?
R241,19
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Document also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SmartscoreAaron Chicago State University
Follow You need to be logged in order to follow users or courses
Sold
42
Member since
1 year
Number of followers
3
Documents
3253
Last sold
5 hours ago
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3,8

4 reviews

5
2
4
1
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions