• Nursing Exams
  • HESI A2 EXAMS
  • Finance and Insurance
  • NCLEX EXAM
  • Real Estate
  • Business
  • Medical Technology
  • Counseling and Social Work
  • English Language
  • Graduate and Professional School
  • CAREER EXAMS
  • Medical Professional
  • K 12 EXAMS
  • Personal Fitness
  • Public Service and Legal
  • Teaching
  • Nutrition
  • Construction and Industry
  • Test

WGU C725 Information Security and Assurance

CAREER EXAMS Nov 6, 2025
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

WGU C725 Information Security and Assurance

Which two passwords are the weakest?

Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - ✔✔Love@$MySon80 Password1234

Which groups typically report to the chief security officer (CSO)? - ✔✔Security engineering and operations

What is the formula for computing single loss expectancy - ✔✔SLE = AV x EF [Single Loss Expectancy = Asset Value x Exposure Factor]

A violation of the "separation of duties" principle arises when the security systems software is accessed by which of the following individuals? - ✔✔Systems programmer

An example of the separation of duties of a computer operation is when a company has one environment for the software developers, another for quality assurance testing, and a third for production, or the environment that end users access, to perform their duties. As software is deemed ready, it is promoted from environment to environment by systems and security

administration personnel, not the programmer. This separation of duties prevents a programmer from launching into production software that can perpetrate fraud or cause damage to production data or resources.

What is the formula for computing annualized loss expectancy? - ✔✔ALE=SLE x ARO Single Loss Expectancy x Annual Rate of Occurrence

What is the first thing you should do when a disaster Strikes? - ✔✔Ensure the people are safe.

Provide two examples of devices that might be used to harden a system - ✔✔Computer-safe fire suppression system and uninterruptible power supplies

What are some of the elements that should be included in emergency response guidelines? - ✔✔Immediate response procedures, notification procedures, and secondary response procedures.

What is the first step that individuals responsible for the development of a business continuity plan should perform? - ✔✔Business organization analysis

The business organization analysis helps the initial planners select appropriate BCP team members and then guides the overall BCP process.

What disaster recovery principle best protects your organization against hardware failure? - ✔✔Redundancy

Redundant systems/components provide protection against the failure of one particular piece of hardware.

A company consults a best practices manual from its vendor while deploying a new IT system.Which type of document does this exemplify? - ✔✔Guildlines

What is the main objective of separation of duties? - ✔✔To ensure that no single individual can compromise a system

Separation of duties is the prevention of conflict of interest, wrongful acts, fraud, abuse, and errors. Also, it is the detection of control failures that include security breaches, information theft, and circumvention of security controls.

If a programmer is restricted from updating and modifying production software, what is this an example of? - ✔✔Least privilege

The principle of least privilege, a concept in computer security, provides minimal user profile privileges based on users' job necessities.

What is Fail-Secure system controls? - ✔✔Fail-secure system controls preserve the state of the system before the crash and prevent further damage or unauthorized access to the system

One example of this is a bank vault located in a high-security room. The trusted recovery control is the room itself, which can detect any attempt at an unauthorized entry and lock the perpetrator in an area where he cannot escape (see the discussion on mantraps in Lesson 8, "Physical Security Control").

Operations security requires the implementation of physical security to control which of the following? - ✔✔Unauthorized personnel access

Physical and environmental protection prevents unauthorized individuals from accessing media and protects against such factors as heat, cold, or harmful magnetic fields.

What is Trusted Computing Base (TCB)? - ✔✔is the totality of protection mechanisms within a computer system, including hardware, firmware, and software

What is a trusted system according to TCB? - ✔✔According to the TCB, a trusted system is a system that can be expected to meet users' requirements for reliability, security, and effectiveness because it has undergone formal testing and validation

What is Hardware Segmentation"? - ✔✔specifically relates to the segmentation of memory into protected segments. The kernel allocates the required amount of memory for the process to load its application code, its process data, and its application data. The system prevents user processes from accessing another process's allocated memory. It also prevents user processes from accessing system memory.

Download Study Material

No purchase options are available for this study material at the moment.

Study Material Information

Category: CAREER EXAMS
Description:

WGU C725 Information Security and Assurance Which two passwords are the weakest? Pa$$w0Rd%^78 Love@$MySon80 C@1Il@VEm1 Password1234 - ✔✔Love@$MySon80 Password1234 Which groups typically report ...