100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU- C725 Questions and Answers(A+ Solution guide)

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
10-10-2023
Written in
2023/2024

SOX (Sarbanes-Oxley Act) - Requires corporate executives to review and modernize their company's financial reporting systems. GLBA (Gramm-Leach-Bliley Act) - Known as the Financial Modernization Act of 1999. It is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information. To be GLBA compliant, financial institutions must communicate to their customers how they share the customers' sensitive data, inform customers of their right to opt-out if they prefer that their personal data not be shared with third parties. What are the three methods of sanitization? - Overwriting Deguassing Destruction Mandatory Access Control (MAC) - Uses security labels for access control. Highly restrictive, usually used within government agencies. E.g. TS, SCI, etc. Discretionary Access Control (DAC) - A means of restricting access to objects based on the identity of subjects and/or groups to which they belong. What are the problems with passwords? - Passwords can be insecure, and easily broken. Dictionary words are not advised. Passwords are inconvenient, and repudiable. RADIUS - Remote Access Dial-In User Service; client/server protocol and software that enables remote access users to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. Cryptosystem - is the hardware or software implementation that transforms plaintext into ciphertext (encrypting it) and back into plaintext (decrypting it).Cryptography - the art of protecting information by transforming it into an unreadable format, called cipher text Cryptanalysis - The science or art of breaking a cryosystem Cryptology - The umbrella study of cryptography and cryptanalysis Cryptographers rely on two basic methods of disguising messages - Transposition, in which letters are rearranged into a different order Substitution, in which letters are replaced by other letters and/or symbols. Symmetric Key Encryption - Encryption system in which a single key is used for both encryption and decryption. DES. 3DES. AES. Asymmetric Key Encryption - Encryption system when a different key is used to encrypt and to decrypt. PGP.

Show more Read less
Institution
WGU- C725
Course
WGU- C725

Content preview

WGU - C725

SOX (Sarbanes -Oxley Act) - ✔✔ Requires corporate executives to review and modernize their
company's financial reporting systems.

GLBA (Gramm -Leach -Bliley Act) - ✔✔ Known as the Fin ancial Modernization Act of 1999. It is a United
States federal law that requires financial institutions to explain how they share and protect their
customers' private information. To be GLBA compliant, financial institutions must communicate to their
customers how they share the customers' sensitive data, inform customers of their right to opt -out if
they prefer that their personal data not be shared with third parties.

What are the three methods of sanitization? - ✔✔ Overwriting
Deguassing
Destruction

Mandatory Access Control (MAC) - ✔✔ Uses security labels for access control. Highly restrictive,
usually used within government agencies. E.g. TS, SCI, etc.

Discretionary Access Control (DAC) - ✔✔ A means of restricting access to objects based on the identi ty
of subjects and/or groups to which they belong.

What are the problems with passwords? - ✔✔ Passwords can be insecure, and easily broken.
Dictionary words are not advised. Passwords are inconvenient, and repudiable.

RADIUS - ✔✔ Remote Access Dial -In User Service; client/server protocol and software that enables
remote access users to communicate with a central server to authenticate dial -in users and authorize
their access to the requested system or service.

Cryptosystem - ✔✔ is the hardware or software i mplementation that transforms plaintext into
ciphertext (encrypting it) and back into plaintext (decrypting it).
Powered by TCPDF (www.tcpdf.org)
1 / 1

Written for

Institution
WGU- C725
Course
WGU- C725

Document information

Uploaded on
October 10, 2023
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainarium Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1878
Member since
2 year
Number of followers
1044
Documents
22591
Last sold
13 hours ago

3.8

324 reviews

5
150
4
62
3
54
2
16
1
42

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions