WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW questions and answers well explained.
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW questions and answers well explained. The Fabrication attack type most commonly affects which principle(s) of the CIA triad? A. Availability B. Integrity C. Confidentiality D. Integrity and Availability E. Confidentiality and Integrity - correct answers.Integrity and Availability The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Integrity and Availability B.Confidentiality and Integrity C.Availability D.Integrity E.Confidentiality - correct answers.Confidentiality Something that has the potential to cause harm to our assets is known as a(n) ________. A.Threat B.Impact C.Risk D.Vulnerability - correct answers.Threat Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. A.Logical controls B.Administrative controls C.Physical controls - correct answers.Logical Control What is the first and arguably one of the most important steps of the risk management process? A.Assess risks B.Mitigate risks C.Identify threats D.Assess vulnerabilities E.Identify assets - correct answers.Identify assets Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - correct mation security A type of attack, primarily against confidentiality - correct answers.Interception Something that has the potential to cause harm to our assets - correct answers.Threat A weakness that can be used to harm us - correct answers.Vulnerability The likelihood that something bad will happen - correct answers.Risk An attack that involves tampering with our assets - correct answers.Modification attack A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity - correct answers.Parkerian hexad The physical disposition of the media on which the data is stored - correct answers.Possession or control An attack that involves generating data, processes, communications, or other similar activities with a system - correct answers.Fabrication attack A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail - correct answers.Defense in depth Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data - correct answers.Logical controls Controls that protect the physical environment in which our systems sit, or where our data is stored - correct answers.Physical controls
Written for
- Institution
- WGU C836
- Course
- WGU C836
Document information
- Uploaded on
- January 14, 2024
- Number of pages
- 22
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c836 multicomprehensive final exam review
Also available in package deal