{"id":113592,"date":"2023-08-16T02:22:40","date_gmt":"2023-08-16T02:22:40","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=113592"},"modified":"2023-08-16T02:22:42","modified_gmt":"2023-08-16T02:22:42","slug":"wgu-c725-test-bank-2023-masters-course-information-security-and-assurance-2023-test-bank-300-real-exam-questions-and-correct-answersagrade-2","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/16\/wgu-c725-test-bank-2023-masters-course-information-security-and-assurance-2023-test-bank-300-real-exam-questions-and-correct-answersagrade-2\/","title":{"rendered":"WGU C725 TEST BANK 2023 MASTER&#8217;S COURSE INFORMATION SECURITY AND ASSURANCE 2023 TEST BANK 300 REAL EXAM QUESTIONS AND CORRECT ANSWERS|AGRADE"},"content":{"rendered":"\n<p>WGU C725 TEST BANK 2023 MASTER&#8217;S COURSE<br>INFORMATION SECURITY AND ASSURANCE 2023 TEST<br>BANK 300 REAL EXAM QUESTIONS AND CORRECT<br>ANSWERS|AGRADE<br>An employee has worked for the same organization for years and still has access to<br>legal files even though this employee now works in accounting. Which principle<br>has been violated? &#8211; ANSWER- Least privilege<br>A sales specialist is a normal user of a corporate network. The corporate network<br>uses subjects, objects, and labels to grant users access. Which access control<br>methodology is the corporation using? &#8211; ANSWER- Mandatory<br>What is considered a valid method for testing an organization&#8217;s disaster recovery<br>plan, according to the Certified Information Systems Security Professional<br>(CISSP)? &#8211; ANSWER- Checklist<br>Who directs policies and procedures that are designed to protect information<br>resources in an organization? &#8211; ANSWER- Information resources security officer<br>Which topics should be included in employee security training program? &#8211;<br>ANSWER- Social engineering, shoulder surfing, phishing, malware<br>What is a threat to business operations &#8211; ANSWER- Sophisticated hacking tools<br>purchased by a disgruntled employee<br>Which statement describes a threat? &#8211; ANSWER- Spear fishing attack<br>Which type of control reduces the effect of an attack? &#8211; ANSWER- Corrective<br>Which security control should be included in a risk management policy? &#8211;<br>ANSWER- Exception process<\/p>\n\n\n\n<p>The organization applies comprehensive hardening to all its computer assets. Due<br>to the high cost of accomplishing this, the security manager decides to withhold<br>any further spending on IT security for the remainder of the year. The manager<br>believes that because of the complexity and secrecy of the organization&#8217;s security<br>configuration, these computer assets are relatively safe. Which flawed security<br>principle is the security manager relying on &#8211; ANSWER- Security through<br>obscurity<br>The company receives notification from its security monitoring service that an<br>unauthorized physical breach of its datacenter occurred. The perpetrator was able<br>to guess the correct code to the keypad device that controls access. Which type of<br>risk management control could have prevented this breach from occurring? &#8211;<br>ANSWER- Multifactor authentication<br>The company identifies a risk with an asset that has relatively low value. The cost<br>to secure the asset is $2 million. An insurance company will insure the loss of the<br>asset for $150,000 a year. The company decides not to take any action to protect<br>the asset. Which risk management strategy did the company choose to follow? &#8211;<br>ANSWER- 45<br>Acceptance<br>Which type of system controls preserves the state of the system before a crash and<br>prevents further damage or unauthorized access to a system? &#8211; ANSWER- Fail<br>secure<br>A software development company follows a process where software is moved from<br>the development environment, to the testing environment for quality assurance,<br>and then on to production. Which individual should be restricted from migrating<br>the software to the production environment? &#8211; ANSWER- Lead programmer<br>After an audit of user access, a CIO is concerned about improperly granted<br>permissions. Which type of user access should the CIO be most concerned with? &#8211;<br>ANSWER- Elevated<br>Which attack uses common words and phrases to guess passwords? &#8211; ANSWERDictionary<\/p>\n\n\n\n<p>What is a disadvantage of discretionary access control (DAC)? &#8211; ANSWEREmpowers owners to decide access levels<br>Which password problem persists when accessing information and systems even<br>with a strong password management and creation policy? &#8211; ANSWER- Passwords<br>are repudiable.<br>An organization wants to update its policies that govern email acceptable use,<br>internet acceptable use, laptop security, and wireless security. Which type of<br>policies should the organization update to accomplish this? &#8211; ANSWER- Issue<br>Specific<br>Which type of documents do organizations use to explain step-by-step<br>instructions? &#8211; ANSWER- Procedures<br>Data entry specialists at a hospital are only supposed to be able to enter new patient<br>records into the database but not be able to access existing records. Because the<br>permissions were not set correctly, some data entry specialists have been accessing<br>existing patient records and making unauthorized changes. Hospital administrators<br>want be able to easily grant permissions based on job type. Which security<br>principle should the organization implement to solve this problem? &#8211; ANSWERRBAC<br>A company was the victim of a phishing attack. This attack occurred because a<br>cybercriminal recovered employee company email addresses from a stolen laptop.<br>How should employee company email addresses be classified? &#8211; ANSWERBusiness sensitive<br>An accountant finds an error in the way interest is credited to customer accounts.<br>The IT department traces the error to a patch that IT put on the software used to<br>track customer accounts. The error cost the organization about $100,000 in<br>overpayments. What is the IT department&#8217;s role in this case? &#8211; ANSWERCustodian<br>Which type of hypervisor installs directly onto the hardware where the host OS<br>would normally reside? &#8211; ANSWER- Type 1<br>Management is concerned that data will be lost when using virtual machines (VM).<br>What are two ways to preserve data in VMs? Choose 2 answers. &#8211; ANSWER- Full<br>and hypervisor updates<\/p>\n\n\n\n<p>Which type of investigation is completed internally and examines either<br>operational issues or a violation of the organization&#8217;s policies? &#8211; ANSWERAdministrative<br>Which two types of information about evidence are required to preserve the chain<br>of custody? &#8211; ANSWER- Relevant circumstances surrounding the collection of the<br>evidence<br>Name of the person collecting the evidenc<br>You must ensure that a complete inventory of your organization&#8217;s assets is<br>maintained. Which components are necessary in the asset management inventory?<br>firmware versions<br>operating system versions<br>application versions<br>hardware devices installed &#8211; ANSWER- All the points<br>Question 2 :What is the primary function of portable storage media, such as Zip,<br>Jaz, and flash drives? &#8211; ANSWER- to exchange data<br>___________is the process of wiping out data from storage media to ensure that<br>the data is not recoverable and cannot be reused. &#8211; ANSWER- Sanitization<br>What defines the minimum level of security? &#8211; ANSWER- Baselines<br>Question 4 :As a security professional, you have been asked to determine the<br>appropriate retention policies for media, hardware, data, and personnel. You decide<br>to first document the appropriate data retention policies. Which of the following<br>statements is NOT true of developing these policies? &#8211; ANSWER- You should<br>work with data custodians to develop the appropriate data retention policy for each<br>type of data the organization owns.<br>You have been asked to provide scoping and tailoring guidance for an<br>organization&#8217;s security controls. Which of the following guidelines is NOT true<br>regarding this process? &#8211; ANSWER- Scoping and tailoring are closely tied to<br>access control lists.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C725 TEST BANK 2023 MASTER&#8217;S COURSEINFORMATION SECURITY AND ASSURANCE 2023 TESTBANK 300 REAL EXAM QUESTIONS AND CORRECTANSWERS|AGRADEAn employee has worked for the same organization for years and still has access tolegal files even though this employee now works in accounting. Which principlehas been violated? &#8211; ANSWER- Least privilegeA sales specialist is a normal user [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-113592","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=113592"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113592\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=113592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=113592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=113592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}