WGU C725 Information Security and Assurance
People – – – ✔✔Information security is primarily a discipline to manage the behavior of _.
A. Technology
B. People
C. Processes
D. Organizations
All of these – – – ✔✔Careers in information security are booming because of which of the
following factors?
A. Threats of cyberterrorism
B. Government regulations
C. Growth of the Internet
D. All of these
Security policies and procedures
Explanation: Answer A is correct.
The Carnegie Melon Information Network Institute (INI) designed programs to carry out
multiple tasks including Information Security Policies. – – – ✔✔A program for information
security should include which of the following elements?
A. Security policies and procedures
B. Intentional attacks only
C. Unintentional attacks only
D. None of these
D. All of these – – – ✔✔The growing demand for InfoSec specialists is occurring predominantly
in which of the following types of organizations?
A. Government
B. Corporations
C. Not-for-profit foundations
D. All of these
Confidentiality – – – ✔✔The concept of the measures used to ensure the protection of the secrecy
of data, objects, or resources.
B-Rate Safe Rating – – – ✔✔A catchall safe rating for any box with a lock on it. This rating
describes the thickness of the steel used to make the lockbox. No actual testing is performed to
gain this rating.
C-Rate Safe Rating – – – ✔✔This safe rating is defined as a variably thick steel box with a 1-
inch-thick door and a lock. No tests are conducted to provide this rating, either.
UL TL-15 Safe Rating – – – ✔✔Safes with an Underwriters Laboratory rating that have passed
standardized tests as defined in Underwriters Laboratory Standard 687 using tools and an expert
group of safe-testing engineers. The safe rating label requires that the safe be constructed of 1-
inch solid steel or equivalent. The label means that the safe has been tested for a net working
time of 15 minutes using “common hand tools, drills, punches hammers, and pressure applying
devices.” Net working time means that when the tool comes off the safe, the clock stops.
Engineers exercise more than 50 different types of attacks that have proven effective for
safecracking.
UL TL-30 Safe Rating – – – ✔✔This Underwriters Laboratory rating testing is essentially the
same as the TL-15 testing, except for the net working time. Testers get 30 minutes and a few
more tools to help them gain access. Testing engineers usually have a safe’s manufacturing
blueprints and can disassemble the safe before the test begins to see how it works.
B. Disclosure
Explanation:
Confidentiality models are primarily intended to ensure that no unauthorized access to
information is permitted and that accidental disclosure of sensitive information is not possible. – –
- ✔✔Related to information security, confidentiality is the opposite of which of the following?
A. Closure
B. Disclosure
C. Disaster
D. Disposal
D. All of these
Explanation:
Integrity models keep data pure and trustworthy by protecting system data from intentional or
accidental changes. – – – ✔✔Integrity models have which of the three goals:
A. Prevent unauthorized users from making modifications to data or programs
B. Prevent authorized users from making improper or unauthorized modifications
C. Maintain internal and external consistency of data and programs
D. All of these
D. All of these