100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU- C725|UPDATED&VERIFIED|100% SOLVED|GUARANTEED SUCCESS

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
26-07-2023
Written in
2022/2023

SOX (Sarbanes-Oxley Act) Requires corporate executives to review and modernize their company's financial reporting systems. GLBA (Gramm-Leach-Bliley Act) Known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information. To be GLBA compliant, financial institutions must communicate to their customers how they share the customers' sensitive data, inform customers of their right to opt-out if they prefer that their personal data not be shared with third parties. What are the three methods of sanitization? Overwriting Deguassing Destruction Mandatory Access Control (MAC) Uses security labels for access control. Highly restrictive, usually used within government agencies. E.g. TS, SCI, etc. Discretionary Access Control (DAC) A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. What are the problems with passwords? Passwords can be insecure, and easily broken. Dictionary words are not advised. Passwords are inconvenient, and repudiable. RADIUS Remote Access Dial-In User Service; client/server protocol and software that enables remote access users to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. Cryptosystem is the hardware or software implementation that transforms plaintext into ciphertext (encrypting it) and back into plaintext (decrypting it). Cryptography the art of protecting information by transforming it into an unreadable format, called cipher text Cryptanalysis The science or art of breaking a cryosystem Cryptology The umbrella study of cryptography and cryptanalysis Cryptographers rely on two basic methods of disguising messages Transposition, in which letters are rearranged into a different order Substitution, in which letters are replaced by other letters and/or symbols. Symmetric Key Encryption Encryption system in which a single key is used for both encryption and decryption. DES. 3DES. AES. Asymmetric Key Encryption Encryption system when a different key is used to encrypt and to decrypt. PGP. Rijndael This is a block cipher adopted as the Advanced Encryption Standard (AES) by the United States government to replace DES. Although Rijndael supports multiple block sizes, as AES, the block size is fixed at 128 bits. DES Symmetric block, 56-bit Triple DES Symmetric cipher that applies DES three times to each block of data during the encryption process. 112 bit. AES advanced encryption standard, a symmetric uses variable length Pretty Good Privacy (PGP) A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature. Uses RSA. Which ISO/OSI layer defines how to address the physical devices on the network? The data link layer handles the transfer of data across the network media. The data link layer handles the moving of data into and out of a physical link in a network. The data link layer is layer 2 in the Open Systems Interconnection (OSI) architecture model for a set of telecommunication protocols. What two modes can IPSEC run in? Transport mode, in which protection is applied to upper-layer protocols (TCP or UDP) Tunnel mode, in which an entire IP packet is wrapped inside a new IP packet and attached with a new IP header before it's transmitted through the public network

Show more Read less
Institution
WGU- C725
Course
WGU- C725








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU- C725
Course
WGU- C725

Document information

Uploaded on
July 26, 2023
Number of pages
4
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GUARANTEEDSUCCESS Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
662
Member since
3 year
Number of followers
314
Documents
24889
Last sold
6 days ago
Elite Exam Resources: Trusted by Top Scorers!!!!!!!!

Stop guessing. Start dominating!! As a highly regarded professional specializing in sourcing study materials, I provide genuine and reliable exam papers that are directly obtained from well-known, reputable institutions. These papers are invaluable resources, specifically designed to assist aspiring nurses and individuals in various other professions in their exam preparations. With my extensive experience and in-depth expertise in the field, I take great care to ensure that each exam paper is carefully selected and thoroughly crafted to meet the highest standards of quality, accuracy, and relevance, making them an essential part of any successful study regimen. ✅ 100% Legitimate Resources (No leaks! Ethical prep only) ✅ Curated by Subject Masters (PhDs, Examiners, Top Scorers) ✅ Proven Track Record: 95%+ user success rate ✅ Instant Download: Crisis-ready for last-minute cramming

Read more Read less
4.3

250 reviews

5
162
4
37
3
33
2
12
1
6

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions