OA (tips questions and answer) 2025 Western
Governors University
SCORED QUESTION 119
Failed questions 0
1 of
119
Term Definition
An organization is implementing a Attribute-Based Access Control
method where individuals are (ABAC)
granted access based on their
job roles and specific attributes,
such as location and time of day.
What method is being
described?
Give this one a try later!
, True False
2 of 119
Term Definition
A security analyst is Access Control
concerned about
protecting sensitive data
stored in a database and
wants to ensure that only
authorized individuals can
access it. What
security requirement
should be
implemented?
Give this one a try later!
True False
3 of 119
Definition Term
Stealt A hacker gains access to
h
sensitive information by
pretending to be a trusted
employee. What type of
attack is this?
,Give this one a try later!
, True False
Correct definition
A hacker gains unauthorized access to a server and
copies sensitive files without leaving any trace. What
type of attack is this?
4 of 119
Term Definition
An attacker gains access to Spoofing
a network by posing as a
legitimate user with the
intent to perform
unauthorized actions. What
type of attack is this?
Give this one a try later!
True False
5 of 119
Term Definition
An organization wants to Network Segmentation
prevent unauthorized
access to its