Computer Science > QUESTIONS & ANSWERS > WGU C724 : Unit 7 - Module 11 (Quiz Review) (All)

WGU C724 : Unit 7 - Module 11 (Quiz Review)

Document Content and Description Below

WGU C724 : Unit 7 - Module 11 (Quiz Review) What is the primary goal of information security? Correct answer- Reduce losses related to losses in confidentiality, availability and integrity. Th... ere are many different kinds of malware, which could be a spyware, worm, virus, or Trojan horse. In general, any _______________________________________ that is downloaded and stored on a computer hard drive can cause undesirable damage to the computer or network system. Correct answer- Virus There are several low-tech attacks that criminals can use to steal sensitive information from individuals in public places. One of the most common methods is ____________________________, in which individuals are offered a gift for completing an application for a credit card. Correct answer- Quid Pro Quo The U.S. government enacted legislation and regulations to protect privacy and do what else? Correct answer- Enact and enforce security, and manage and retain documentation - Such laws and regulations include the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002. What can be used to counter the risks, vulnerabilities, and threats experienced by managers in organizations? Correct answer- Security Measures Which of the following is NOT a component of an organization's framework for security and control? Correct answer- Cost-Benefit Analysis [True/False] To gain entry to secured location at airports or the building of some government agencies, a photo identification (which is classified as a knowledge authentication method) is all you need to have. Correct answer- False - Photo identification is an identity method, not knowledge method. Computer-based actions are actions that involved the use of a computer. Which of the following is NOT a computer-based action? Correct answer- Randomizing your online behavior - a behavioral action that can help to deter cyber attack. The disaster recovery plan (DRP) addresses several issues when an emergency occurs. What item below would NOT be addressed in a DRP? Correct answer- Businesses perform regular backups for operational databases. Which of the following networks is the easiest for someone to gain access to? Correct answer- Wireless Networks - not all wireless routers are secure and protected, so access is open. (Select all that apply). People access the Internet all the time. What is considered acceptable online cond [Show More]

Last updated: 2 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

106
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 26, 2022

Number of pages

4

Written in

Seller


seller-icon
Tenhang

Member since 2 years

12 Documents Sold

Reviews Received
2
0
0
0
1
Additional information

This document has been written for:

Uploaded

Jul 26, 2022

Downloads

 0

Views

 106

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·