WGU D107 CYBER SECURITY ESSENTIALS
FINAL EXAM 2025
They collect sensitive information
They contain personal information - Precise Answer ✔✔Technologies
like GIS and IoE contribute to the growth of large data stores. What are
two reasons that these technologies increase the need for cybersecurity
specialists? (Choose two.)
They are part of a protest group behind a political cause - Precise
Answer ✔✔Which statement best describes a motivation of hacktivists?
high earning potential
a career-field in high-demand
service to the public - Precise Answer ✔✔A specialist in the HR
department is invited to promote the cybersecurity program in
community schools. Which three topics would the specialist emphasize
in the presentation to draw students to this field? (Choose three.)
Honeynet project - Precise Answer ✔✔What is an example of early
warning systems that can be used to thwart cybercriminals?
Packet Forgery - Precise Answer ✔✔Which type of cybercriminal attack
would interfere with established network communication through the
use of constructed packets so that the packets look like they are part of
the normal communication?
,Trusted partners, ex-employees - Precise Answer ✔✔Which two groups
of people are considered internal attackers? (Choose two.)
Internet of Everything - Precise Answer ✔✔What does the acronym IoE
represent?
Linkedin - Precise Answer ✔✔What is an example of an Internet data
domain?
establishing early warning systems
sharing cyber Intelligence information - Precise Answer ✔✔Thwarting
cyber criminals includes which of the following? (Choose two.)
A weakness that makes a target susceptible to an attack - Precise Answer
✔✔What does the term vulnerability mean?
medical
employment
education - Precise Answer ✔✔Pick three types of records that cyber
criminals would be interested in stealing from organizations. (Choose
three.)
Algorithm - Precise Answer ✔✔What type of an attack can disable a
computer by forcing it to use memory or by overworking its CPU?
, DDoS - Precise Answer ✔✔What type of attack uses many systems to
flood the resources of a target, thus making the target unavailable?
Analyze - Precise Answer ✔✔What is the workforce framework
category that includes highly specialized review and evaluation of
incoming cybersecurity information to determine if it is useful for
intelligence?
Goals - Precise Answer ✔✔What is identified by the first dimension of
the cybersecurity cube?
Integrity, Availability, Confidentiality - Precise Answer ✔✔What are
the three foundational principles of the cybersecurity domain? (Choose
three.)
confidentiality - Precise Answer ✔✔What principle prevents the
disclosure of information to unauthorized people, resources, and
processes?
authorization
authentication - Precise Answer ✔✔What are two methods that ensure
confidentiality? (Choose two.)
PII
classified
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller YANCHY. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.