100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
01-12-2024
Written in
2024/2025

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Course

Document information

Uploaded on
December 1, 2024
Number of pages
46
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

At a small company, an employee makes an unauthorized data alteration.



Integrity

Confidentiality

Availability

Authenticity - ANSWER:Integrity

An organization plans to encrypt data in transit on a network.



Which aspect of data is the organization attempting to protect?



Authenticity

Possession

Availability

Integrity - ANSWER:Integrity

Which aspect of the CIA triad is violated by an unauthorized database roll back or undo?



Integrity

Confidentiality

Availability

Identification - ANSWER:Integrity

A company's website has suffered several denial of service (DoS) attacks and wishes to thwart future
attacks.



Which security principle is the company addressing?



Availability

Confidentiality

,Possession

Authenticity - ANSWER:Availability

An organization has a requirement that all database servers and file servers be configured to maintain
operations in the presence of a failure.



Which principle of the CIA triad is this requirement implementing?



Availability

Confidentiality

Utility

Integrity - ANSWER:Availability

Which tool can be used to map devices on a network, along with their operating system types and
versions?



Port scanner

Stateful firewall

Packet filter

Packet sniffer - ANSWER:Port scanner

Which web attack is a server-side attack?



SQL injection

Cross-site scripting

Cross-site request forgery

Clickjacking - ANSWER:SQL injection

A new start-up company has started working on a social networking website. The company has moved all
its source code to a cloud provider and wants to protect this source code from unauthorized access.



Which cyber defense concept should the start-up company use to maintain the confidentiality of its
source code?

,File encryption

Alarm systems

Antivirus software

Account permissions - ANSWER:File encryption

A company has an annual audit of installed software and data storage systems. During the audit, the
auditor asks how the company's most critical data is used. This determination helps the auditor ensure
that the proper defense mechanisms are in place to protect critical data.



Which principle of the Parkerian hexad is the auditor addressing?



Utility

Possession

Authenticity

Integrity - ANSWER:Utility

Which web attack is possible due to a lack of input validation?



SQL injection

Cross-site request forgery

Clickjacking

Extraneous files - ANSWER:SQL injection

Which cybersecurity term is defined as the potential for an attack on a resource?



Threat

Vulnerability

Risk

Impact - ANSWER:Threat

Which security type deliberately exposes a system's vulnerabilities or resources to an attacker?



Intrusion detection

, Intrusion prevention

Firewalls

Honeypots - ANSWER:Honeypots

An organization employs a VPN to safeguard its information.



Which security principle is protected by a VPN?



Data in motion

Data in storage

Data at rest

Data in use - ANSWER:Data in motion

A malicious hacker was successful in a denial of service (DoS) attack against an institution's mail server.
Fortunately, no data was lost or altered while the server was offline.



Which type of attack is this?



Interruption

Interception

Modification

Fabrication - ANSWER:Interruption

A company has had several successful denial of service (DoS) attacks on its email server.



Which security principle is being attacked?



Availability

Confidentiality

Integrity

Possession - ANSWER:Availability

Which file action implements the principle of confidentiality from the CIA triad?
$18.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TEACHME3 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
1 year
Number of followers
0
Documents
499
Last sold
7 months ago
TEACH ME 2

Welcome to TestBanksGuru, your go-to source for high-quality test banks and study materials designed to help you excel academically. We offer a comprehensive range of resources including test banks, study guides, solution manuals, and other study materials, all meticulously curated to ensure accuracy and effectiveness. Our affordable, instantly accessible materials are complemented by excellent customer support, making your learning experience seamless and efficient. Trust Testbanksguru to be your partner in academic success, providing the tools you need to achieve your educational goals.

Read more Read less
4.2

419 reviews

5
210
4
126
3
56
2
19
1
8

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions