Computer Science  >  QUESTIONS & ANSWERS  >  WGU C724 : Unit 7 - Module 11 (Quiz Review) (All)

WGU C724 : Unit 7 - Module 11 (Quiz Review)

Document Content and Description Below

WGU C724 : Unit 7 - Module 11 (Quiz Review) What is the primary goal of information security? Correct answer- Reduce losses related to losses in confidentiality, availability and integrity. Th ... ere are many different kinds of malware, which could be a spyware, worm, virus, or Trojan horse. In general, any _______________________________________ that is downloaded and stored on a computer hard drive can cause undesirable damage to the computer or network system. Correct answer- Virus There are several low-tech attacks that criminals can use to steal sensitive information from individuals in public places. One of the most common methods is ____________________________, in which individuals are offered a gift for completing an application for a credit card. Correct answer- Quid Pro Quo The U.S. government enacted legislation and regulations to protect privacy and do what else? Correct answer- Enact and enforce security, and manage and retain documentation - Such laws and regulations include the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999, and the Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002. What can be used to counter the risks, vulnerabilities, and threats experienced by managers in organizations? Correct answer- Security Measures Which of the following is NOT a component of an organization's framework for security and control? Correct answer- Cost-Benefit Analysis [True/False] To gain entry to secured location at airports or the building of some government agencies, a photo identification (which is classified as a knowledge authentication method) is all you need to have. Correct answer- False - Photo identification is an identity method, not knowledge method. Computer-based actions are actions that involved the use of a computer. Which of the following is NOT a computer-based action? Correct answer- Randomizing your online behavior - a behavioral action that can help to deter cyber attack. The disaster recovery plan (DRP) addresses several issues when an emergency occurs. What item below would NOT be addressed in a DRP? Correct answer- Businesses perform regular backups for operational databases. Which of the following networks is the easiest for someone to gain access to? Correct answer- Wireless Networks - not all wireless routers are secure and protected, so access is open. (Select all that apply). People access the Internet all the time. What is considered acceptable online cond [Show More]

Last updated: 3 years ago

Preview 1 out of 4 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of WGU C724 : Unit 7 - Module 11 (Quiz Review) document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$10.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

113
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 26, 2022

Number of pages

4

Written in

All

Seller


Profile illustration for Tenhang
Tenhang

Member since 3 years

12 Documents Sold

Reviews Received
2
0
0
0
1
Additional information

This document has been written for:

Uploaded

Jul 26, 2022

Downloads

 0

Views

 113

Document Keyword Tags


$10.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·