100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C724 : Unit 7 - Module 11 (Quiz Review $7.99   Add to cart

Exam (elaborations)

WGU C724 : Unit 7 - Module 11 (Quiz Review

 4 views  0 purchase
  • Course
  • Institution

WGU C724 : Unit 7 - Module 11 (Quiz Review A department mines the prior year's data to determine if there are patterns related to absenteeism on a month-by-month basis. Which department (i.e. business function) benefits from this technology? Correct answer- Human Resources A department utilizes...

[Show more]
Last document update: 2 year ago

Preview 2 out of 4  pages

  • July 26, 2022
  • July 26, 2022
  • 4
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU C724 : Unit 7 - Module 11 (Quiz
Review)

What is the primary goal of information security? Correct answer- Reduce losses related
to losses in confidentiality, availability and integrity.

There are many different kinds of malware, which could be a spyware, worm, virus, or
Trojan horse. In general, any _______________________________________ that is
downloaded and stored on a computer hard drive can cause undesirable damage to the
computer or network system. Correct answer- Virus

There are several low-tech attacks that criminals can use to steal sensitive information
from individuals in public places. One of the most common methods is
____________________________, in which individuals are offered a gift for completing
an application for a credit card. Correct answer- Quid Pro Quo

The U.S. government enacted legislation and regulations to protect privacy and do what
else? Correct answer- Enact and enforce security, and manage and retain
documentation - Such laws and regulations include the Health Insurance Portability and
Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka
Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and
Investor Act (aka Sarbanes-Oxley Act) of 2002.

What can be used to counter the risks, vulnerabilities, and threats experienced by
managers in organizations? Correct answer- Security Measures

Which of the following is NOT a component of an organization's framework for security
and control? Correct answer- Cost-Benefit Analysis

[True/False] To gain entry to secured location at airports or the building of some
government agencies, a photo identification (which is classified as a knowledge
authentication method) is all you need to have. Correct answer- False - Photo
identification is an identity method, not knowledge method.

Computer-based actions are actions that involved the use of a computer. Which of the
following is NOT a computer-based action? Correct answer- Randomizing your online
behavior - a behavioral action that can help to deter cyber attack.

The disaster recovery plan (DRP) addresses several issues when an emergency
occurs. What item below would NOT be addressed in a DRP? Correct answer-
Businesses perform regular backups for operational databases.

, Which of the following networks is the easiest for someone to gain access to? Correct
answer- Wireless Networks - not all wireless routers are secure and protected, so
access is open.

(Select all that apply). People access the Internet all the time. What is considered
acceptable online conduct? Correct answer- Be careful with the sites you visit.
Check content before you download it.

Identity theft can be very devastating to innocent victims. What is the first step that
people can take to help lessen the severity of risk and to help mitigate or eliminate other
risks if their identities are stolen in the future? Correct answer- Understand which assets
are irreplaceable and how they are vulnerable.

The purpose of information security is to protect the information from illegal use and
unauthorized access. Which of the following is NOT part of the triad encompassing the
three categories of threats to information assets? Correct answer- Security - the three
goals of information security are Confidentiality, Integrity, and Availability.

All cyber threats or attacks are associated with computers; therefore, all computer risks
are limited to ________________________. Correct answer- Both high-tech and low-
tech attacks.

Criminals use low-tech attacks to steal sensitive information from individuals in public
places. One method is called
_____________________________________, which is leaving a jump drive
unattended in a parking lot and waiting for someone else to pick it up and connect it to
their home computer. Correct answer- Baiting

Businesses encounter losses as a direct result of exposure to security threats or risks.
Which choice would NOT be a direct loss? Correct answer- Employee Turnover

[True/False] Environmental risks alone can be easily addressed. However, the human
factor increases the challenge of mitigating environmental risks. Correct answer- True

What kind of controls manages the restrictions that employees may have to the
corporate data resources? Correct answer- Application - Application controls is a type of
configured restrictions within a specific software application, such as restrictions on the
employees who might request supplier payments, authorize payment for goods, or send
checks to suppliers.

There are two primary concepts within information security. The ____________
concept, otherwise known informally as need-to-know, indicates that access should only
be provided to those who need it to complete tasks in their job. Correct answer-
Principle of Least Privilege

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76799 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
  Add to cart