Exam (elaborations)
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW
[Show more]
Preview 3 out of 21 pages
Uploaded on
November 11, 2024
Number of pages
21
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
Institution
WGU C836
Course
WGU C836
$11.99
100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached
WGU C836 MULTI/COMPREHENSIVE
FINAL EXAM REVIEW
The0Fabrication0attack0type0most0commonly0affects0which0principle(s)0of0the0CIA0triad?
A.0Availability
B.0Integrity
C.0Confidentiality
D.0Integrity0and0Availability
E.0Confidentiality0and0Integrity0-0ans--Integrity0and0Availability
The0Interception0attack0type0most0commonly0affects0which0principle(s)0of0the0CIA0triad?
0This0task0contains0the0radio0buttons0and0checkboxes0for0options.0The0shortcut0keys0to0p
erform0this0task0are0A0to0H0and0alt+10to0alt+9.
A.Integrity0and0Availability
B.Confidentiality0and0Integrity
C.Availability
D.Integrity
E.Confidentiality0-0ans--Confidentiality
Something0that0has0the0potential0to0cause0harm0to0our0assets0is0known0as0a(n)0_______
_.
A.Threat
B.Impact
C.Risk
D.Vulnerability0-0ans--Threat
Controls0that0protect0the0systems,0networks,0and0environments0that0process,0transmit,0a
nd0store0our0data0are0called0_______.
A.Logical0controls
B.Administrative0controls
C.Physical0controls0-0ans--Logical0Control
What0is0the0first0and0arguably0one0of0the0most0important0steps0of0the0risk0management0p
rocess?
A.Assess0risks
B.Mitigate0risks
C.Identify0threats
D.Assess0vulnerabilities
,E.Identify0assets0-0ans--Identify0assets
Protects0information0and0information0systems0from0unauthorized0access,0use,0disclosure
,0disruption,0modification,0or0destruction0-0ans--information0security
A0type0of0attack,0primarily0against0confidentiality0-0ans--Interception
Something0that0has0the0potential0to0cause0harm0to0our0assets0-0ans--Threat
A0weakness0that0can0be0used0to0harm0us0-0ans--Vulnerability
The0likelihood0that0something0bad0will0happen0-0ans--Risk
An0attack0that0involves0tampering0with0our0assets0-0ans--Modification0attack
A0model0that0adds0three0more0principles0to0the0CIA0triad:0possession0or0control,0utility,0a
nd0authenticity0-0ans--Parkerian0hexad
The0physical0disposition0of0the0media0on0which0the0data0is0stored0-0ans--
Possession0or0control
An0attack0that0involves0generating0data,0processes,0communications,0or0other0similar0act
ivities0with0a0system0-0ans--Fabrication0attack
A0multilayered0defense0that0will0allow0us0to0achieve0a0successful0defense0should0one0or0
more0of0our0defensive0measures0fail0-0ans--Defense0in0depth
Sometimes0called0technical0controls,0these0protect0the0systems,0networks,0and0environ
ments0that0process,0transmit,0and0store0our0data0-0ans--Logical0controls
Controls0that0protect0the0physical0environment0in0which0our0systems0sit,0or0where0our0da
ta0is0stored0-0ans--Physical0controls
The0risk0management0phase0that0consists0of0all0of0the0activities0that0we0can0perform0in0a
dvance0of0the0incident0itself,0in0order0to0better0enable0us0to0handle0it0-0ans--
Preparation0phase
The0risk0management0phase0where0we0detect0the0occurrence0of0an0issue0and0decide0wh
ether0it0is0actually0an0incident0so0that0we0can0respond0to0it0appropriately0-0ans--
Detection0and0analysis0phase
The0biometric0characteristic0that0measures0how0well0a0factor0resists0change0over0time0a
nd0with0advancing0age0is0called0__________.
A.0Collectability
B.0Acceptability
, C.Universality
D.Uniqueness
E.Permanence0-0ans--E.Permanence
What0type0of0authentication0can0prevent0a0man-in-the-middle0attack?
0This0task0contains0the0radio0buttons0and0checkboxes0for0options.0
A.Multifactor
B.Mutual
C.Something0you0know
D.Something0you0are
ESomething0you0do0-0ans--B.Mutual
An0authentication0mechanism0in0which0both0parties0authenticate0each0other0-0ans--
Mutual0authentication
Describes0the0ease0with0which0a0system0can0be0tricked0by0a0falsified0biometric0identifier0
-0ans--Circumvention
A0user0who0creates0a0network0share0and0sets0permissions0on0that0share0is0employing0w
hich0model0of0access0control?
0This0task0contains0the0radio0buttons0and0checkboxes0for0options.0The0shortcut0keys0to0p
erform0this0task0are0A0to0H0and0alt+10to0alt+9.
A.0Mandatory0access0control
B.0Discretionary0access0control
C.0Attribute-based0access0control
D.0Role-based0access0control0-0ans--Discretionary0access0control
What0type0of0access0control0can0prevent0the0confused0deputy0problem?
0This0task0contains0the0radio0buttons0and0checkboxes0for0options.0The0shortcut0keys0to0p
erform0this0task0are0A0to0H0and0alt+10to0alt+9.
A.ACLs
B.A0password0policy
C.Capability-based0security
D.A0locked0door0-0ans--Capability-based0security
Confidential0Services0Inc.0is0a0military-
support0branch0consisting0of01,4000computers0with0Internet0access0and02500servers.0All0
employees0are0required0to0have0security0clearances.0From0the0options0listed0below,0wha
t0access0control0model0would0be0most0appropriate0for0this0organization?
0This0task0contains0the0radio0buttons0and0checkboxes0for0options.0The0shortcut0keys0to0p
erform0this0task0are0A0to0H0and0alt+10to0alt+9.
A.Discretionary0access0control
B.Role-based0access0control