WGU C724 Information Systems Management Unit 7 Tes
WGU C724 Information Systems Management Unit 7 Tes
Exam (elaborations)
WGU C724 Information Systems Management Unit 7 Test
5 views 0 purchase
Course
WGU C724 Information Systems Management Unit 7 Tes
Institution
WGU C724 Information Systems Management Unit 7 Tes
False Correct answer- [True/False] Information is a valuable asset and not everyone in
the world can be trusted with it. Therefore, we need to protect our valuable information
from those with poor intentions. The protection of our information assets is a discipline
known as data security.
a.) T...
wgu c724 information systems management unit 7 test
information is a valuable asset and not everyone in the world can be trusted with it therefore
we need to protect our valuable information from th
Written for
WGU C724 Information Systems Management Unit 7 Tes
All documents for this subject (3)
Seller
Follow
EvaTee
Reviews received
Content preview
WGU C724 Information Systems
Management Unit 7 Test
False Correct answer- [True/False] Information is a valuable asset and not everyone in
the world can be trusted with it. Therefore, we need to protect our valuable information
from those with poor intentions. The protection of our information assets is a discipline
known as data security.
a.) True
b.) False
Black Hat Correct answer- Organizations are constantly encountering cyber-attacks
from intruders. For instance, in late 2013, the security system of Target Stores, Inc.,
was compromised by which of the following type of attacker?
a.) Grey Hat
b.) Black Hat
c.) White Hat
Phishing Correct answer- Criminals use which method to send legitimate-looking emails
to innocent victims, which direct them to a Website where they are asked to input
personal information such as user logon and password?
a.) Identity theft
b.) Pharming
c.) Social engineering
d.) Phishing
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999 Correct
answer- Organizations must follow procedures to store or transfer their financial
information as outlined in which of the following legislation?
a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of
2002
b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996
c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Auditing can only be used by the accounting department Correct answer- Security
policies are output from an organization's risk assessment process, which cover an
, organization's need for various levels of security. Auditing is an example of a security
policies control. Which of the following is FALSE regarding auditing?
a.) Auditing is used by many divisions and departments within an organization
b.) Auditing can only be used by the accounting department
c.) An IS auditor may penetrate security policies to determine their adequacy or need for
training
False Correct answer- [True/False] The process of turning information into an
unreadable format to prevent unauthorized access is known as decryption.
a.) True
b.) False
Hot sites Correct answer- Organizations need to include redundancy in their business
disaster recovery plan by creating duplicate facilities. Which of the following sites offer
offsite office space that allow recovery within minutes to hours?
a.) Warm sites
b.) Shared hot sites
c.) Cold sites
d.) Hot sites
A and B Correct answer- (Select all that apply). What are some of the actions that savvy
users do to protect their privacy?
a.) Delete cookies from the computer periodically
b.) Enable popup blockers
c.) Do not use anonymous browsing
Consult legal counsel and retain documentation of all stolen information Correct
answer- If your identity has been stolen, what should you do?
a.) Protect access to your information assets
b.) Understand the methods that criminals used to steal the personal information
c.) Understand which assets are irreplaceable and how they are vulnerable
d.) Consult legal counsel and retain documentation of all stolen information
A small business owner installs Microsoft Office suite on all the computers in his office
Correct answer- Which of the following action is considered ethical, social, and legally
acceptable?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.