100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Final Exam Questions With Correct Answers Latest 2024 (100% Verified)

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
07-01-2024
Written in
2023/2024

WGU C836 Final Exam Questions With Correct Answers Latest 2024 (100% Verified) The Fabrication attack type most commonly affects which principle(s) of the CIA triad? A. Availability B. Integrity C. Confidentiality D. Integrity and Availability E. Confidentiality and Integrity (Ans- Integrity and Availability The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Integrity and Availability B.Confidentiality and Integrity C.Availability D.Integrity E.Confidentiality (Ans- Confidentiality Something that has the potential to cause harm to our assets is known as a(n) ________. WGU C836 Comprehensive Final Exam Questions and Answers Latest 2023/2024 100% Verified A.Threat B.Impact C.Risk D.Vulnerability (Ans- Threat Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. A.Logical controls B.Administrative controls C.Physical controls (Ans- Logical Control What is the first and arguably one of the most important steps of the risk management process? A.Assess risks B.Mitigate risks C.Identify threats D.Assess vulnerabilities E.Identify assets (Ans- Identify assets The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________. A. Collectability B. Acceptability C.Universality D.Uniqueness E.Permanence (Ans- E.Permanence What type of authentication can prevent a man-in-the-middle attack? This task contains the radio buttons and checkboxes for options. A.Multifactor B.Mutual C.Something you know D.Something you are ESomething you do (Ans- B.Mutual A user who creates a network share and sets permissions on that share is employing which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A. Mandatory access control B. Discretionary access control C. Attribute-based access control D. Role-based access control (Ans- Discretionary access control What type of access control can prevent the confused deputy problem? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.ACLs B.A password policy C.Capability-based security D.A locked door (Ans- Capability-based security Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Discretionary access control B.Role-based access control C.Attribute-based access control D.Mandatory access control (Ans- D.Mandatory access control A VPN connection that is set to time out after 24 hours is demonstrating which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Mandatory access control B.Role-based access control C.Attribute-based access control D.Discretionary access control (Ans- Attribute-based access control Lesson: Authorization and Access Control Objective: More Advanced What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Nonrepudiation B.Deterrence C.Auditing D.Accountability E.Authorization (Ans- C.Auditing Lesson: Auditing and Accountability Objective: Introduction Nessus is an example of a(n) _______________ tool. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Fuzzing B.Anti-virus C.Anti-malware D.Vulnerability scanning E.Penetration testing (Ans- D.Vulnerability scanning A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Deterrence B.Nonrepudiation C.Intrusion detection and prevention D.Authentication E.Authorization (Ans- B.Nonrepudiation _______ provides us with the means to trace activities in our environment back to their source. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Access B.Authentication C.Accountability D.Authorization E.Nonrepudiation (Ans- C.Accountability Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs? This task contains the radio buttons and checkboxes for options.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 7, 2024
Number of pages
24
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c836
  • wgu
  • c836
  • late

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYROOM2024 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
397
Member since
2 year
Number of followers
212
Documents
3947
Last sold
1 month ago

For all Nursing Test Banks visit my page. All Papers are Verified and Graded to Score A++ Wish you Success.

3.5

59 reviews

5
19
4
14
3
13
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions