WGU C725 Information Security and Assurance | Questions with 100% Correct Answers | Verified | Latest Update

WGU C725 Information Security and Assurance
Which two passwords are the weakest?
Pa$$w0Rd%^78
Love@$MySon80
C@1Il@VEm1
Password1234 – ✔✔Love@$MySon80
Password1234
Which groups typically report to the chief security officer (CSO)? – ✔✔Security engineering and
operations
What is the formula for computing single loss expectancy – ✔✔SLE = AV x EF [Single Loss
Expectancy = Asset Value x Exposure Factor]
A violation of the “separation of duties” principle arises when the security systems software is
accessed by which of the following individuals? – ✔✔Systems programmer
An example of the separation of duties of a computer operation is when a company has one
environment for the software developers, another for quality assurance testing, and a third for
production, or the environment that end users access, to perform their duties. As software is
deemed ready, it is promoted from environment to environment by systems and security

administration personnel, not the programmer. This separation of duties prevents a programmer
from launching into production software that can perpetrate fraud or cause damage to production
data or resources.
What is the formula for computing annualized loss expectancy? – ✔✔ALE=SLE x ARO Single
Loss Expectancy x Annual Rate of Occurrence
What is the first thing you should do when a disaster Strikes? – ✔✔Ensure the people are safe.
Provide two examples of devices that might be used to harden a system – ✔✔Computer-safe fire
suppression system and uninterruptible power supplies
What are some of the elements that should be included in emergency response guidelines? –
✔✔Immediate response procedures, notification procedures, and secondary response procedures.
What is the first step that individuals responsible for the development of a business continuity
plan should perform? – ✔✔Business organization analysis
The business organization analysis helps the initial planners select appropriate BCP team
members and then guides the overall BCP process.
What disaster recovery principle best protects your organization against hardware failure? –
✔✔Redundancy

Leave a Comment

Scroll to Top