WGU C724 Information Systems Management Unit 7 Test Verified Questions And Answers
False - [True/False] Information is a valuable asset and not everyone
... [Show More] in the world can be trusted with it. Therefore, we need to protect our valuable information from those with poor intentions. The protection of our information assets is a discipline known as data security.
a.) True
b.) False
Black Hat - Organizations are constantly encountering cyber-attacks from intruders. For instance, in late 2013, the security system of Target Stores, Inc., was compromised by which of the following type of attacker?
a.) Grey Hat
b.) Black Hat
c.) White Hat
Phishing - Criminals use which method to send legitimate-looking emails to innocent victims, which direct them to a Website where they are asked to input personal information such as user logon and password?
a.) Identity theft
b.) Pharming
c.) Social engineering
d.) Phishing
Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999 - Organizations must follow procedures to store or transfer their financial information as outlined in which of the following legislation?
a.) Public Company Accounting Reform and Investor Act (aka Sarbanes-Oxley Act) of 2002
b.) Health Insurance Portability and Accountability Act (HIPAA) of 1996
c.) Financial Services Modernization Act (aka Gramm-Leach-Bliley Act) of 1999
Auditing can only be used by the accounting department - Security policies are output from an organization's risk assessment process, which cover an organization's need for various levels of security. Auditing is an example of a security policies control. Which of the following is FALSE regarding auditing?
a.) Auditing is used by many divisions and departments within an organization
b.) Auditing can only be used by the accounting department
c.) An IS auditor may penetrate security policies to determine their adequacy or need for training
False - [True/False] The process of turning information into an unreadable format to prevent unauthorized access is known as decryption.
a.) True
b.) False
Hot sites - Organizations need to include redundancy in their business disaster recovery plan by creating duplicate facilities. Which of the following sites offer offsite office space that allow recovery within minutes to hours? [Show Less]