100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D315| OA| OBJECTIVE ASSESSMENT| EXAM QUESTIONS AND ANSWERS| LATEST UPDATE | FULLY SOLVED

Rating
-
Sold
-
Pages
104
Grade
A+
Uploaded on
02-02-2026
Written in
2025/2026

WGU D315| OA| OBJECTIVE ASSESSMENT| EXAM QUESTIONS AND ANSWERS| LATEST UPDATE | FULLY SOLVED

Institution
Module











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Module

Document information

Uploaded on
February 2, 2026
Number of pages
104
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 |OA| OBJECTIVE ASSESSMENT | EXAM
QUESTIONS AND ANSWERS


Correct 180

Incorrect




Term




Rule-Based Access Control

, Don't know?




2 of 180

Term



In order to prevent insider attacks, a company requires participation
from at least two users to perform critical tasks.


Which principle is used to address accounting in the scenario?



Give this one a try later!



Unpatched software Confidentiality




Separation of duties Social engineering


Don't know?




3 of 180

Term



An attacker performs a port scan to:



Give this one a try later!



Identify vulnerabilities and
plan further attacks by A system where access controls are
discovering open ports and based on the job function of users

, the services or applications within an organization
running on them



Use transport level encryption Asset management policy


Don't know?




4 of 180

Term



A critical software application fails to start due to an expired license
key, halting business operations. Which component of the CIA triad
does this scenario impact?



Give this one a try later!



An exploit Availability




Authorization Integrity


Don't know?

, 5 of 180

Term



A hacker exploits a known flaw in an operating system that hasn't
been updated in months, gaining unauthorized access. This is an
example of an attack exploiting:



Give this one a try later!



Separation of duties Unpatched software




Data modification Rule-Based Access Control


Don't know?




6 of 180

Term



Data encryption at rest primarily addresses which component of the
CIA triad?



Give this one a try later!



Insider Threat Social Engineering




Private Cloud Confidentiality
£16.91
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
millyphilip West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
2840
Member since
3 year
Number of followers
1957
Documents
42079
Last sold
11 hours ago
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.7

540 reviews

5
234
4
86
3
103
2
31
1
86

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions