WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW
QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS 100%
CORRECT RATED A+ NEWLY PASSED!!!
Which part(s) of the CIA triad are most commonly impacted by a Fabrication
attack?
A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and Integrity
✅ ANS >>> D. Integrity and Availability
Which aspect(s) of the CIA triad are usually targeted in an Interception
attack?
A. Integrity and Availability
B. Confidentiality and Integrity
C. Availability
D. Integrity
E. Confidentiality
✅ ANS >>> E. Confidentiality
What term refers to something that could potentially harm your assets?
A. Threat
B. Impact
C. Risk
D. Vulnerability
✅ ANS >>> A. Threat
, logomarks| 54339004
What kind of controls are responsible for securing data-processing systems,
networks, and environments?
A. Logical controls
B. Administrative controls
C. Physical controls
✅ ANS >>> A. Logical controls
Which is the first and possibly most critical step in managing risk?
A. Assess risks
B. Mitigate risks
C. Identify threats
D. Assess vulnerabilities
E. Identify assets
✅ ANS >>> E. Identify assets
What is the practice of safeguarding information and systems from
unauthorized actions such as access, alteration, or destruction?
✅ ANS >>> Information security
Which attack method focuses primarily on breaching confidentiality?
✅ ANS >>> Interception
What do we call a potential source of danger to our assets?
✅ ANS >>> Threat
What is defined as a weakness that might be exploited to cause harm?
✅ ANS >>> Vulnerability
What is the chance or possibility that an undesirable event will happen?
✅ ANS >>> Risk
, logomarks| 54339004
What type of attack involves unauthorized changes to data or systems?
✅ ANS >>> Modification attack
Which model expands the CIA triad with additional principles like control,
usefulness, and authenticity?
✅ ANS >>> Pinkerian Hexad
What term refers to the physical control or custody of storage media?
✅ ANS >>> Possession or control
Which type of attack involves generating fake data, signals, or activities
within a system?
✅ ANS >>> Fabrication attack
What strategy uses multiple layers of defense to ensure protection even if one
layer fails?
✅ ANS >>> Defense in depth
What are controls that are also referred to as technical measures and help
safeguard digital data and systems?
✅ ANS >>> Logical controls
What type of security measures protects the actual physical areas where
systems and data are housed?
✅ ANS >>> Physical controls
Which risk management stage includes proactive steps taken before incidents
occur to better handle potential threats?
✅ ANS >>> Preparation phase
, logomarks| 54339004
Which phase focuses on identifying and analyzing issues to determine whether
they are incidents needing response?
✅ ANS >>> Detection and analysis phase
Which biometric trait refers to how stable or resistant it is to changes over
time?
A. Collectability
B. Acceptability
C. Universality
D. Uniqueness
E. Permanence
✅ ANS >>> E. Permanence
Which type of authentication can help protect against man-in-the-middle
attacks?
A. Multifactor
B. Mutual
C. Something you know
D. Something you are
E. Something you do
✅ ANS >>> B. Mutual
What is the term for an authentication method where both parties confirm
each other’s identity?
✅ ANS >>> Mutual authentication
What term describes how easily a biometric system can be tricked using fake
data?
✅ ANS >>> Circumvention
A user who creates a network share and sets permissions on that share is
employing which model of access control? This task contains the radio buttons and