WGU D315 PRACTICE TEST|PA|PRE-
ASSESSMENT
Correct
Incorrect
.
credentials before granting access?
Application Accounting
, Don't know?
2 of 179
Term
An attacker sends emails claiming that an online account has been
locked. The email provides a fake link with the goal of tricking the
users into providing login credentials.
Which type of cyberattack is described?
Give this one a try later!
Whaling Phishing
Hacking Vishing
Don't know?
3 of 179
Term
Which cloud deployment often utilizes exclusive (non-shared)
hardware?
Give this one a try later!
, Private Cloud Multi-cloud
Hybrid Cloud Public Cloud
Don't know?
4 of 179
Term
Which team is responsible for defending and securing an
organizations IT infrastructure and assets?
Give this one a try later!
Purple Security Team White Security Team
Red Security Team Blue Security Team
Don't know?
5 of 179
Term
According to the Protection and Electronic Documents Act
(PIPEDA), personal information must be protected by...
Give this one a try later!
, Appropriate security
Digital passwords and encryption
safeguards
Data encryption at rest Encryption only
Don't know?
6 of 179
Term
After discovering that employees have been circumventing session
timeouts for a company's internal network, the company is holding
meetings to inform employees of the motivation behind the timeouts
and risks involved in the workaround.
Which security principle is demonstrated in this scenario?
Give this one a try later!
Separation of responsibility Separation of privilege
Economy of mechanism Psychological acceptability
Don't know?
7 of 179
Term
ASSESSMENT
Correct
Incorrect
.
credentials before granting access?
Application Accounting
, Don't know?
2 of 179
Term
An attacker sends emails claiming that an online account has been
locked. The email provides a fake link with the goal of tricking the
users into providing login credentials.
Which type of cyberattack is described?
Give this one a try later!
Whaling Phishing
Hacking Vishing
Don't know?
3 of 179
Term
Which cloud deployment often utilizes exclusive (non-shared)
hardware?
Give this one a try later!
, Private Cloud Multi-cloud
Hybrid Cloud Public Cloud
Don't know?
4 of 179
Term
Which team is responsible for defending and securing an
organizations IT infrastructure and assets?
Give this one a try later!
Purple Security Team White Security Team
Red Security Team Blue Security Team
Don't know?
5 of 179
Term
According to the Protection and Electronic Documents Act
(PIPEDA), personal information must be protected by...
Give this one a try later!
, Appropriate security
Digital passwords and encryption
safeguards
Data encryption at rest Encryption only
Don't know?
6 of 179
Term
After discovering that employees have been circumventing session
timeouts for a company's internal network, the company is holding
meetings to inform employees of the motivation behind the timeouts
and risks involved in the workaround.
Which security principle is demonstrated in this scenario?
Give this one a try later!
Separation of responsibility Separation of privilege
Economy of mechanism Psychological acceptability
Don't know?
7 of 179
Term