100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C725 MASTER'S COURSE INFORMATION SECURITY AND ASSURANCE EXAM QUESTIONS AND ANSWERS 2024 $17.99   Add to cart

Exam (elaborations)

WGU C725 MASTER'S COURSE INFORMATION SECURITY AND ASSURANCE EXAM QUESTIONS AND ANSWERS 2024

 6 views  0 purchase
  • Course
  • WGU C725 MASTER\'S COURSE INFORMATION SECURITY AND
  • Institution
  • WGU C725 MASTER\'S COURSE INFORMATION SECURITY AND

WGU C725 MASTER'S COURSE INFORMATION SECURITY AND ASSURANCE EXAM QUESTIONS AND ANSWERS 2024

Preview 3 out of 26  pages

  • September 28, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu
  • wgu c725
  • c725
  • WGU C725 MASTER'S COURSE INFORMATION SECURITY AND
  • WGU C725 MASTER'S COURSE INFORMATION SECURITY AND
avatar-seller
Teacher101
WGU C725 MASTER'S COURSE
INFORMATION SECURITY AND ASSURANCE
EXAM
Question 1 :Management is concerned that attackers will attempt to access
information in the database. They have asked you to implement database
protection using bogus data in hopes that the bogus data will mislead attackers.
Which technique is being requested? - ANSWERS-Noise and perturbation



__________ is another protection technique for database security.

This involves splitting the database into many parts and making it difficult for an
intruder to collect and combine confidential information and deduce relevant
facts. - ANSWERS-Partitioning



_________ is the technique used to protect confidential information stored in the
databases by hiding the database cells that can be used to disclose confidential
information. - ANSWERS-Cell suppression



___________refers to providing security to the database by incorporating security
features into the functionality of the front-end client software that is used to
issue instructions to the back-end server by using a structured query language.
The trusted front-end client software acts as an interface to the back-end
database system and provides the resultant output based on the input
instructions issued by the user. - ANSWERS-A trusted front-end

,You need to ensure that a set of users can access information regarding
departmental expenses. However, each user should only be able to view the
expenses for the department in which they work. Senior managers should be able
to view the expenses for all departments. Which database security feature
provides this granular access control? - ANSWERS-Database view



________ are used to limit user and group access to certain information based on
the user privileges and the need to know. - ANSWERS-Database views



You are reviewing the access control methods used by an organization. The
organization is concerned with the cost of access control. Which aspect of the
information being safeguarded will most affect this cost? - ANSWERS-Information
value



__________ will affect the access control design. While it may affect the cost, it is
not the most important factor affecting it. - ANSWERS-Information type



Question 2 :The new security plan for your organization states that all data on
your servers must be classified to ensure appropriate access controls are
implemented. What is true of information classification?



A data owner must determine the information classification of an asset



.Data classification refers to assigning security labels to information assets.

, A data custodian must determine the classification of an information asset.



The two primary classes of data classification deal with government and military
institutions and private sector organizations.



.The two primary classes of the data classification scheme apply to nonprofit
organizations and financial institutions. - ANSWERS-points a, b, and d only



After the data owner determines the classification levels, the _________actually
implements the information classification scheme. One purpose of information
classification is to define the parameters required for security labels. After being
classified, it is difficult to declassify information. Management is ultimately
responsible for data classification. - ANSWERS-data custodian



What is typically part of an information policy? - ANSWERS-Classification of
information



You are considering the sensitivity and criticality of your organization's data.
Which of the following statements is NOT true? - ANSWERS-Data that is sensitive
should also be considered critical.



Sensitivity and _______ are not related. - ANSWERS-criticality

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Teacher101. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart