WGU D315 |OA| OBJECTIVE ASSESSMENT | EXAM
QUESTIONS AND ANSWERS
Correct 180
Incorrect
Term
Rule-Based Access Control
, Don't know?
2 of 180
Term
In order to prevent insider attacks, a company requires participation
from at least two users to perform critical tasks.
Which principle is used to address accounting in the scenario?
Give this one a try later!
Unpatched software Confidentiality
Separation of duties Social engineering
Don't know?
3 of 180
Term
An attacker performs a port scan to:
Give this one a try later!
Identify vulnerabilities and
plan further attacks by A system where access controls are
discovering open ports and based on the job function of users
, the services or applications within an organization
running on them
Use transport level encryption Asset management policy
Don't know?
4 of 180
Term
A critical software application fails to start due to an expired license
key, halting business operations. Which component of the CIA triad
does this scenario impact?
Give this one a try later!
An exploit Availability
Authorization Integrity
Don't know?
, 5 of 180
Term
A hacker exploits a known flaw in an operating system that hasn't
been updated in months, gaining unauthorized access. This is an
example of an attack exploiting:
Give this one a try later!
Separation of duties Unpatched software
Data modification Rule-Based Access Control
Don't know?
6 of 180
Term
Data encryption at rest primarily addresses which component of the
CIA triad?
Give this one a try later!
Insider Threat Social Engineering
Private Cloud Confidentiality
QUESTIONS AND ANSWERS
Correct 180
Incorrect
Term
Rule-Based Access Control
, Don't know?
2 of 180
Term
In order to prevent insider attacks, a company requires participation
from at least two users to perform critical tasks.
Which principle is used to address accounting in the scenario?
Give this one a try later!
Unpatched software Confidentiality
Separation of duties Social engineering
Don't know?
3 of 180
Term
An attacker performs a port scan to:
Give this one a try later!
Identify vulnerabilities and
plan further attacks by A system where access controls are
discovering open ports and based on the job function of users
, the services or applications within an organization
running on them
Use transport level encryption Asset management policy
Don't know?
4 of 180
Term
A critical software application fails to start due to an expired license
key, halting business operations. Which component of the CIA triad
does this scenario impact?
Give this one a try later!
An exploit Availability
Authorization Integrity
Don't know?
, 5 of 180
Term
A hacker exploits a known flaw in an operating system that hasn't
been updated in months, gaining unauthorized access. This is an
example of an attack exploiting:
Give this one a try later!
Separation of duties Unpatched software
Data modification Rule-Based Access Control
Don't know?
6 of 180
Term
Data encryption at rest primarily addresses which component of the
CIA triad?
Give this one a try later!
Insider Threat Social Engineering
Private Cloud Confidentiality