100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT COMPLETE EXAM QUESTIONS AND CORRECT ANSWERS (NEWEST )

Rating
-
Sold
-
Pages
19
Uploaded on
16-01-2026
Written in
2025/2026

WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT COMPLETE EXAM QUESTIONS AND CORRECT ANSWERS (NEWEST )....

Institution
WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT
Course
WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT
Course
WGU D489 TASK 1 | CYBERSECURITY MANAGEMENT

Document information

Uploaded on
January 16, 2026
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

1. What is cybersecurity? Cybersecurity is the practice of protecting systems,
networks, programs, and data from digital attacks, unauthorized access, and
damage.
2. What are the three pillars of the CIA triad? Confidentiality, Integrity, and
Availability.
3. What does confidentiality mean in cybersecurity? Confidentiality ensures
that sensitive information is accessible only to authorized individuals and
protected from unauthorized disclosure.
4. What does integrity mean in the CIA triad? Integrity ensures that data
remains accurate, complete, and unaltered except by authorized parties.
5. What does availability mean in cybersecurity? Availability ensures that
systems, networks, and data are accessible and functional when needed by
authorized users.
6. What is the principle of least privilege? The principle of least privilege
means granting users only the minimum level of access necessary to perform
their job functions.
7. What is defense in depth? Defense in depth is a layered security approach
that uses multiple security controls to protect assets, so if one layer fails, others
provide protection.
8. What is the difference between a threat and a vulnerability? A threat is a
potential danger that could exploit a weakness, while a vulnerability is the
actual weakness or gap in security controls.
9. What is a security risk? Security risk is the potential for loss or harm when
a threat exploits a vulnerability, typically measured as likelihood times impact.

,10. What is the AAA framework in cybersecurity? AAA stands for
Authentication, Authorization, and Accounting - the three components of access
control.
11. What is multi-factor authentication (MFA)? MFA is a security process
requiring users to provide two or more verification factors to gain access to a
resource.
12. What are the three types of authentication factors? Something you know
(password), something you have (token/phone), and something you are
(biometric).
13. What is the principle of separation of duties? Separation of duties
requires that critical tasks be divided among multiple people to prevent fraud
and errors.
14. What is data classification? Data classification is the process of organizing
data into categories based on sensitivity, value, and criticality to the
organization.
15. What are common data classification levels? Public, Internal,
Confidential, and Restricted/Top Secret.
16. What is encryption? Encryption is the process of converting plaintext into
ciphertext using an algorithm to protect data confidentiality.
17. What is the difference between symmetric and asymmetric encryption?
Symmetric encryption uses the same key for encryption and decryption, while
asymmetric uses a public-private key pair.
18. What is a hash function? A hash function is a one-way mathematical
algorithm that converts input data into a fixed-size string of characters, used for
integrity verification.
19. What is a digital signature? A digital signature is a cryptographic
technique that provides authentication, non-repudiation, and integrity
verification of digital messages.
20. What is a firewall? A firewall is a network security device that monitors
and controls incoming and outgoing network traffic based on predetermined
security rules.
21. What is an Intrusion Detection System (IDS)? An IDS is a system that
monitors network traffic for suspicious activity and known threats, generating
alerts when detected.

, 22. What is an Intrusion Prevention System (IPS)? An IPS is similar to an
IDS but can automatically take action to block or prevent detected threats in
real-time.
23. What is the difference between IDS and IPS? IDS only detects and alerts
on threats, while IPS can actively block or prevent threats automatically.
24. What is a VPN? A Virtual Private Network creates an encrypted tunnel
over a public network to provide secure remote access and privacy.
25. What is two-factor authentication? Two-factor authentication requires
users to provide two different types of credentials to verify their identity.
26. What is social engineering? Social engineering is the manipulation of
people into divulging confidential information or performing actions that
compromise security.
27. What is phishing? Phishing is a social engineering attack where attackers
impersonate legitimate entities to trick victims into revealing sensitive
information.
28. What is malware? Malware is malicious software designed to damage,
disrupt, or gain unauthorized access to computer systems.
29. What is ransomware? Ransomware is malware that encrypts victim's data
and demands payment for the decryption key.
30. What is a zero-day vulnerability? A zero-day vulnerability is a security
flaw unknown to the software vendor and without an available patch.
Section 2: Risk Management (Questions 31-60)
31. What is risk management? Risk management is the systematic process of
identifying, assessing, and mitigating security risks to acceptable levels.
32. What are the four risk treatment options? Risk avoidance, risk
mitigation, risk transfer, and risk acceptance.
33. What is risk avoidance? Risk avoidance is eliminating the risk entirely by
not engaging in the activity that creates the risk.
34. What is risk mitigation? Risk mitigation is implementing controls to
reduce the likelihood or impact of a risk.
35. What is risk transfer? Risk transfer is shifting the risk to another party,
typically through insurance or outsourcing.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Mirror Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
385
Member since
2 year
Number of followers
137
Documents
4584
Last sold
4 days ago

3.9

54 reviews

5
21
4
17
3
8
2
3
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions