100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU- C725 Questions and Answers(A+ Solution guide)

Beoordeling
-
Verkocht
-
Pagina's
4
Cijfer
A+
Geüpload op
10-10-2023
Geschreven in
2023/2024

SOX (Sarbanes-Oxley Act) - Requires corporate executives to review and modernize their company's financial reporting systems. GLBA (Gramm-Leach-Bliley Act) - Known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information. To be GLBA compliant, financial institutions must communicate to their customers how they share the customers' sensitive data, inform customers of their right to opt-out if they prefer that their personal data not be shared with third parties. What are the three methods of sanitization? - Overwriting Deguassing Destruction Mandatory Access Control (MAC) - Uses security labels for access control. Highly restrictive, usually used within government agencies. E.g. TS, SCI, etc. Discretionary Access Control (DAC) - A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. What are the problems with passwords? - Passwords can be insecure, and easily broken. Dictionary words are not advised. Passwords are inconvenient, and repudiable. RADIUS - Remote Access Dial-In User Service; client/server protocol and software that enables remote access users to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. Cryptosystem - is the hardware or software implementation that transforms plaintext into ciphertext (encrypting it) and back into plaintext (decrypting it).Cryptography - the art of protecting information by transforming it into an unreadable format, called cipher text Cryptanalysis - The science or art of breaking a cryosystem Cryptology - The umbrella study of cryptography and cryptanalysis Cryptographers rely on two basic methods of disguising messages - Transposition, in which letters are rearranged into a different order Substitution, in which letters are replaced by other letters and/or symbols. Symmetric Key Encryption - Encryption system in which a single key is used for both encryption and decryption. DES. 3DES. AES. Asymmetric Key Encryption - Encryption system when a different key is used to encrypt and to decrypt. PGP.

Meer zien Lees minder
Instelling
WGU- C725
Vak
WGU- C725

Voorbeeld van de inhoud

WGU - C725

SOX (Sarbanes -Oxley Act) - ✔✔ Requires corporate executives to review and modernize their
company's financial reporting systems.

GLBA (Gramm -Leach -Bliley Act) - ✔✔ Known as the Fin ancial Modernization Act of 1999. It is a United
States federal law that requires financial institutions to explain how they share and protect their
customers' private information. To be GLBA compliant, financial institutions must communicate to their
customers how they share the customers' sensitive data, inform customers of their right to opt -out if
they prefer that their personal data not be shared with third parties.

What are the three methods of sanitization? - ✔✔ Overwriting
Deguassing
Destruction

Mandatory Access Control (MAC) - ✔✔ Uses security labels for access control. Highly restrictive,
usually used within government agencies. E.g. TS, SCI, etc.

Discretionary Access Control (DAC) - ✔✔ A means of restricting access to objects based on the identi ty
of subjects and/or groups to which they belong.

What are the problems with passwords? - ✔✔ Passwords can be insecure, and easily broken.
Dictionary words are not advised. Passwords are inconvenient, and repudiable.

RADIUS - ✔✔ Remote Access Dial -In User Service; client/server protocol and software that enables
remote access users to communicate with a central server to authenticate dial -in users and authorize
their access to the requested system or service.

Cryptosystem - ✔✔ is the hardware or software i mplementation that transforms plaintext into
ciphertext (encrypting it) and back into plaintext (decrypting it).
Powered by TCPDF (www.tcpdf.org)
1 / 1

Geschreven voor

Instelling
WGU- C725
Vak
WGU- C725

Documentinformatie

Geüpload op
10 oktober 2023
Aantal pagina's
4
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Brainarium Delaware State University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1857
Lid sinds
2 jaar
Aantal volgers
1044
Documenten
22473
Laatst verkocht
2 dagen geleden

3.8

323 beoordelingen

5
150
4
61
3
54
2
16
1
42

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen