100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
Eerder door jou gezocht
WGU C725 - Information Security and Assurance Graded A+ Which security principle uses countermeasures such as encryption and data classification? €17,55
In winkelwagen
WGU C725 - Information Security and Assurance Graded A+ Which security principle uses countermeasures such as encryption and data classification?
13 keer bekeken 1 keer verkocht
Vak
WGU C725 - Information Security and Assuran
Instelling
WGU C725 - Information Security And Assuran
WGU C725 - Information Security and
Assurance Graded A+
Which security principle uses countermeasures such as encryption and data
classification?
-Confidentiality
-Integrity
-Availablity
-Accountability --------- CORRECT ANSWER ----- Confidentiality
A company is concerned about unauthoriz...
wgu c725 information security and assurance graded a which security principle uses countermeasures such as encryption and data classification confidentiality integrity availablity accountabi
Geschreven voor
WGU C725 - Information Security and Assuran
WGU C725 - Information Security and Assuran
Verkoper
Volgen
johnwachi22
Ontvangen beoordelingen
Voorbeeld van de inhoud
WGU C725 - Information Security and Assurance Graded A+ Which security principle uses countermeasures such as encryption and data classification? -Confidentiality -Integrity -Availablity -Accountability --------- CORRECT ANSWER ----- Confidentiality A company is concerned about unauthorized alteration of data in a customer database. Which security principle is implicated? -Confidentiality -Integrity -Availablity -Accountability --------- CORRECT ANSWER ----- -Integrity Which integrity measure should be applied to enforce nonrepudiation of emails sent from int ernal users? -Use digital signatures on emails -Ensure emails contain accurate data -Hold users accountable for emails -Scan attachments for viruses --------- CORRECT ANSWER ----- Use digital signatures on emails A company is headquartered in a region tha t has frequent internet connectivity issues due to inclement weather. The company's primary reporting servers are located in this office and are critical to the sales team in the field for accurate product pricing. Employees require 24/7 access to the most up-to-date information, as the data frequently changes. Which solution will ensure a higher availability of these servers outside this company? -Develop a mechanism to publish the necessary pricing information to a cloud location for sales teams to acc ess anytime -Open a direct virtual private network (VPN) access connection between the servers and the sales team's computers -Implement a secondary internet connectivity solution at headquarters, which fails over when the primary connection is unavailable -Create a cloud -based web service that queries a cloud database and replicates the product pricing data periodically -------- - CORRECT ANSWER ----- Implement a secondary internet connectivity solution at headquarters, which fails over when the primary connection is unavailable Research department members encrypt their Office 365 files by using keys residing in an on -premises ke y store. Due to a failure of on -premises network connectivity, the files cannot be decrypted. What should be done to maintain the availability of these files without compromising their confidentiality and integrity? -Set up redundant internet connectivi ty -Copy files to an on -premises file server -Maintain files in an unencrypted format -Maintain keys with Office 365 files --------- CORRECT ANSWER ----- -Set up redundant internet connectivity The management team of an organization creates a document s tating employees who access the company's enterprise resource planning (ERP) system must use a certain browser and are required to have antivirus installed on their machines. Which type of document is this? -Standards -Policy -Proicedure -Guidance --------- CORRECT ANSWER ----- Standards Which type of security documentation offers recommendations and suggestions on creating a strong password?+ -Standards -Policy -Proicedure -Guidance --------- CORRECT ANSWER ----- Guidance On an employee's first day of work, she notices a large number of file shares available, most of which do not pertain to her position. The employee went to her manager about the level of access. The employee's manager said she has the same level of access as her predecessor. Which principle does this level of access violate? -Role-based access -Job rotation -Rule-based access -Least Privilege --------- CORRECT ANSWER ----- -Least Privilege A company wants to enforce strict penalties on a former employee who uploaded sensit ive company technical schematics onto a personal website. Which type of document will this company use to enforce penalties? -Nondisclosure Agreement. -Employment agreement -Noncompete agreement -Personnel security agreement --------- CORRECT ANSWER ----- Nondiscrosure Ag Which security concept includes the process of reviewing the activities of an identity? -Accountability -Authentication -Authoriztion -Identification --------- CORRECT ANSWER ----- Accountability Which security concept includes compa ring a user's fingerprint against authorized fingerprints stored in a database? -Accountability -Authentication -Authoriztion -Identification --------- CORRECT ANSWER ----- Authentication An information security manager has been asked to develop security policies and to deploy security solutions for an organization. Which security principles must be considered in addition to CIA triad principles? -Encryption -AAA -Abstraction -Layering --------- CORRECT ANSWER ----- AAA How would you minimalize data loss due to ransomware? -IPS -Firewall -Data Backups -Anti Virus --------- CORRECT ANSWER ----- Data Backups In addition to AAA in CIA triad, what are the 2 additional parts -Confidentiality -Auditing -Accountability -Integrity -Identification --------- CORRECT ANSWER ----- -Auditing -Identity
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper johnwachi22. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €17,55. Je zit daarna nergens aan vast.