(questions and key words) 2025 Western Governors
University
Your answers
game mechanics to drive
False
,Correct definition
Attacks involve generating data, processes, communications,
or other similar activities with a system.
Attacks primarily affect integrity but can be considered an
availability attack.
2 of 246
Term Definition
Performance A system that acts as a control for
network traffic, blocking
unauthorized traffic while
permitting acceptable
use.naturally creates network
segmentation when installed
Give this one a try later!
True False
Correct definition
measures how quickly a system performs a factors such as
speed, accuracy, and error rate.
3 of 246
,Term Definition
Authorization What the user can access, modify,
and delete
Give this one a try later!
True False
4 of 246
Term Definition
software development A type of public key
vulnerabilities cryptosystem that requires a
shorter key length than many
other cryptography systems
(including the de facto industry
standard, RSA).
Give this one a try later!
True False
Correct definition
, • Buffer overflows
• Race conditions
• Input validation attacks
• Authentication attacks
• Authorization attacks
• Cryptographic attacks
5 of 246
Term Definition
Identity verification The half step between identity
and authentication (showing two
forms of Id)
Give this one a try later!
True False
6 of 246
Definition Term
An authentication method that analysis of vulnerabilities
includes multiple methods for a
single authentication transaction.