Computer Science > QUESTIONS & ANSWERS > WGU C724 : Unit 7 - Module 11 (Quiz Review) (All)
WGU C724 : Unit 7 - Module 11 (Quiz Review) What is the primary goal of information security? Correct answer- Reduce losses related to losses in confidentiality, availability and integrity. Th... ere are many different kinds of malware, which could be a spyware, worm, virus, or Trojan horse. In general, any _______________________________________ that is downloaded and stored on a computer hard drive can cause undesirable damage to the computer or network system. Correct answer- Virus There are several low-tech attacks that criminals can use to steal sensitive information from individuals in public places. One of the most common methods is ____________________________, in which individuals are offered a gift for completing an application for a credit card. Correct answer- Quid Pro Quo The U.S. government enacted legislation and regulations to protect privacy and do what else? Correct answer- Enact and enforce security, and manage and retain documentation - Such laws and regulations include the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002. What can be used to counter the risks, vulnerabilities, and threats experienced by managers in organizations? Correct answer- Security Measures Which of the following is NOT a component of an organization's framework for security and control? Correct answer- Cost-Benefit Analysis [True/False] To gain entry to secured location at airports or the building of some government agencies, a photo identification (which is classified as a knowledge authentication method) is all you need to have. Correct answer- False - Photo identification is an identity method, not knowledge method. Computer-based actions are actions that involved the use of a computer. Which of the following is NOT a computer-based action? Correct answer- Randomizing your online behavior - a behavioral action that can help to deter cyber attack. The disaster recovery plan (DRP) addresses several issues when an emergency occurs. What item below would NOT be addressed in a DRP? Correct answer- Businesses perform regular backups for operational databases. Which of the following networks is the easiest for someone to gain access to? Correct answer- Wireless Networks - not all wireless routers are secure and protected, so access is open. (Select all that apply). People access the Internet all the time. What is considered acceptable online cond [Show More]
Last updated: 2 years ago
Preview 1 out of 4 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 26, 2022
Number of pages
4
Written in
This document has been written for:
Uploaded
Jul 26, 2022
Downloads
0
Views
106
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·