100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM PRACTICE TEST QUESTIONS AND DETAILED CORRECT ANSWERS | A+ GRADE STUDYGUIDE 2025 $22.99   Add to cart

Exam (elaborations)

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM PRACTICE TEST QUESTIONS AND DETAILED CORRECT ANSWERS | A+ GRADE STUDYGUIDE 2025

 3 views  0 purchase
  • Course
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM PRACTICE TEST QUESTIONS AND DETAILED CORRECT ANSWERS | A+ GRADE STUDYGUIDE 2025

Preview 4 out of 38  pages

  • August 5, 2024
  • 38
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu c836
  • wgu c836 final exam
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
TUTORWAC
WGU C836 FUNDAMENTALS OF
INFORMATION SECURITY FINAL
EXAM PRACTICE TEST QUESTIONS
AND DETAILED CORRECT ANSWERS |
A+ GRADE STUDYGUIDE 2025
The biometric characteristic that measures how well a
factor resists change over time and with advancing age is
called __________.

A. Collectability
B. Acceptability
C.Universality
D.Uniqueness
E.Permanence Correct Answer E.Permanence

What type of authentication can prevent a man-in-the-
middle attack? This task contains the radio buttons and
checkboxes for options.

A.Multifactor
B.Mutual
C.Something you know
D.Something you are
ESomething you do Correct Answer B.Mutual

,An authentication mechanism in which both parties
authenticate each other Correct Answer Mutual
authentication

Describes the ease with which a system can be tricked by
a falsified biometric identifier Correct Answer
Circumvention

A user who creates a network share and sets permissions
on that share is employing which model of access control?
This task contains the radio buttons and checkboxes for
options. The shortcut keys to perform this task are A to H
and alt+1 to alt+9.
A. Mandatory access control
B. Discretionary access control
C. Attribute-based access control
D. Role-based access control Correct Answer
Discretionary access control

What type of access control can prevent the confused
deputy problem? This task contains the radio buttons and
checkboxes for options. The shortcut keys to perform this
task are A to H and alt+1 to alt+9.

A.ACLs
B.A password policy
C.Capability-based security
D.A locked door Correct Answer Capability-based security

Confidential Services Inc. is a military-support branch
consisting of 1,400 computers with Internet access and

,250 servers. All employees are required to have security
clearances. From the options listed below, what access
control model would be most appropriate for this
organization? This task contains the radio buttons and
checkboxes for options. The shortcut keys to perform this
task are A to H and alt+1 to alt+9.

A.Discretionary access control
B.Role-based access control
C.Attribute-based access control
D.Mandatory access control Correct Answer D.Mandatory
access control

A VPN connection that is set to time out after 24 hours is
demonstrating which model of access control? This task
contains the radio buttons and checkboxes for options.
The shortcut keys to perform this task are A to H and alt+1
to alt+9.

A.Mandatory access control
B.Role-based access control
C.Attribute-based access control
D.Discretionary access control Correct Answer Attribute-
based access control

States that we should allow only the bare minimum access
required in order for a given party (person, user account,
or process) to perform a needed functionality Correct
Answer Principle of least privilege

, Typically built to a certain resource, these contain the
identifiers of the party allowed to access the resource and
what the party is allowed to do. Correct Answer Access
control lists (ACLs)

In this method of security, a person's capabilities are
oriented around the use of a token that controls their
access (e.g. a personal badge) Correct Answer Capability-
based security

A type of attack that is more common in systems that use
ACLs rather than capabilities Correct Answer The
confused deputy problem

A type of attack that misuses the authority of the browser
on the user's computer Correct Answer Cross-site request
forgery (CSRF)

Access is determined by the owner of the resource in
question Correct Answer Discretionary access control
(DAC)

Similar to MAC in that access controls are set by an
authority responsible for doing so, rather than by the
owner of the resource. In this model, access is based on
the role the individual is performing Correct Answer Role-
based access control (RBAC)

Access is based on attributes (of a person, a resource, or
an environment) Correct Answer Attribute-based access
control

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORWAC. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

70840 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.99
  • (0)
  Add to cart