100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D488) ITAS 6291 Cybersecurity Architecture & Engineering Latest Complete OA Guide 2024. $18.49   Add to cart

Exam (elaborations)

WGU D488) ITAS 6291 Cybersecurity Architecture & Engineering Latest Complete OA Guide 2024.

 15 views  1 purchase
  • Course
  • Wgu d488
  • Institution
  • Wgu D488

WGU D488) ITAS 6291 Cybersecurity Architecture & Engineering Latest Complete OA Guide 2024. Nonrepudiation - ANSWER Use of digital signatures Standards - ANSWER Document stating that employees who ..... must ..... Guideline - ANSWER example: security documentation offers recommendations and ...

[Show more]

Preview 4 out of 37  pages

  • September 2, 2024
  • 37
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Wgu d488
  • Wgu d488
avatar-seller
wilmug
WGU D488) ITAS 6291 Cybersecurity
Architecture & Engineering Latest Complete
OA Guide 2024.


Nonrepudiation - ANSWER Use of digital signatures



Standards - ANSWER Document stating that employees who ..... must .....



Guideline - ANSWER example: security documentation offers recommendations and suggestions on
creating a strong password



Noncompete agreement - ANSWER Agreements that restrict employees from competing with the
employer following termination of employment.



Accountability - ANSWER security concept includes the process of reviewing the activities of an identity



Identification - ANSWER (username)



CIA plus AAA - ANSWER



A company plans to implement a new authentication system for customers accessing the company
website. When customers log on, the website indicates that it sent a text message that includes a code
to the customer's mobile phone. To complete the log-on process, the customer is required to enter the
appropriate code within five minutes. - ANSWER Time-Based one-time password



Which security concept controls access to the network? - ANSWER Provide individuals access after they
supply a username and password

,Risk management - ANSWER process identifies factors that could damage or disclose data, evaluates
those factors considering data value and countermeasure cost, and implements cost-effective solutions



purpose of threat modeling tools - ANSWER To consider the range of compromise concerns and focus on
the end result of an attack



SLE - ANSWER



Asset value - ANSWER



Deterrence - ANSWER A company discovers that employees are accessing restricted areas. To discourage
employees, the security manager posts restricted access signs



Avoidance - ANSWER A company hires a consulting group to perform a security audit on its network. The
audit finds that the email servers are vulnerable to SMTP relay attacks. The company decides to migrate
email services to a cloud-based provider and decommission the email servers.



Rejection - ANSWER A private company identifies a risk with a high-value asset. A threat has been
reported to be attacking only government entities. The company's board of directors has concluded that
the threat will likely never materialize for private companies, and that nothing should be done about it.



Risk Assessment Life Cycle (steps) - ANSWER Security categorization

Security control selection

Security control implementation

Security control assessment

Information system authorization

Security control monitoring



risk management framework - ANSWER A guideline or recipe for how risk is to be assessed, resolved,
and monitored

,Private - ANSWER Which data classification would cause serious damage to the mission of an
organization, is less damaging than its highest classification, and is the label used by most organizations
for the classification of PII and PHI data?



Public - ANSWER The document policy of an organization is that there is no negative impact if documents
are released outside the organization.



smart card - ANSWER Logical /Technical control



honeypot - ANSWER Deterctive control



Locks - ANSWER Physical



Background checks - ANSWER Administrative controls



Open Authentication (OAuth 2.0) - ANSWER identity technology is an open request for comments (RFC)
standard that provides access delegation of online websites



Federated identity management (FIM) - ANSWER identity management solution allows multiple
organizations to share identities based on a common method



credential management system - ANSWER solution that allows employees to store usernames and
passwords



Discretionary - ANSWER The vice president of a company distributes corporate policies by emailing
employees links to the files. An IT professional needs to implement a solution that allows only the vice
president to manage who can edit corporate policies.



Which access control model should this professional implement?

, or

'

A company develops project management software. The design requires the project manager to control
access to the project files.



Role Based - ANSWER A company wants only members of its database administrator team to have
administrative access to all SQL server databases.



Which access control model should this company apply?



Mandatory - ANSWER A word-processing program uses document labels to determine which users can
access files. For example, only members of the legal department can access files labeled legal.



It uses classification of data or labels



Access aggregation - ANSWER The collective entitlements granted by multiple systems to one user; can
lead to authorization creep.



example




An attacker uses multiple websites to collect public information and pieces together a profile to be used
for identity impersonation.



Side Channel - ANSWER type of attack that is passive and noninvasive and intended to observe the
operation of a device



Rule-based - ANSWER A company secures its network by closing specific ports on its firewalls.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller wilmug. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78252 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49  1x  sold
  • (0)
  Add to cart