100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025

Rating
-
Sold
-
Pages
37
Uploaded on
09-06-2025
Written in
2024/2025

D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 9, 2025
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

D481 ITAS 5100 Security Foundations

Objective Assessment Review

(Questions & Solutions)

2025




1

, 1. Case: A multinational enterprise is designing its security
architecture using layered defenses to protect highly sensitive
customer data.
Question: Which approach best illustrates a “defense in depth”
strategy for defending against both internal and external threats?
a) Deploying only a perimeter firewall
b) Combining network segmentation, endpoint protection, SIEM
monitoring, and strict access controls
c) Relying solely on strong encryption for data at rest
d) Implementing antivirus software on all endpoints with no
additional controls

Correct ANS: b) Combining network segmentation, endpoint
protection, SIEM monitoring, and strict access controls
Rationale: Defense in depth relies on multiple redundant layers of
security such that breaching one layer does not compromise the
entire system. The ANS (b) integrates several controls—each
addressing different threat vectors—thus providing robust overall
protection.

---

2. Case: An organization is implementing a risk management
process to prioritize remedial actions against possible cybersecurity
threats.
Question: Which framework is most widely adopted for conducting
risk assessments in cybersecurity?
a) ISO 9001
b) NIST SP 800-37 Risk Management Framework
c) ITIL
d) COBIT

Correct ANS: b) NIST SP 800-37 Risk Management Framework
Rationale: NIST SP 800‑37 provides a comprehensive process for
2

,risk management that guides organizations through risk assessment,
mitigation, and monitoring, making it a cornerstone methodology in
cybersecurity.

---

3. Case: A financial institution must secure its online banking
services. The team is examining protocols ensuring data protection
during transmission.
Question: Which protocol is currently recommended to secure
web-based transactions?
a) SSL 3.0
b) TLS 1.2 (or TLS 1.3)
c) IPSec
d) PPTP

Correct ANS: b) TLS 1.2 (or TLS 1.3)
Rationale: TLS (Transport Layer Security) protocols are designed to
provide confidentiality and integrity in network communications. TLS
1.2 and TLS 1.3 replace less secure versions (like SSL) and are the
industry standard for securing web-based communications.

---

4. Case: A cybersecurity team is evaluating a new SIEM solution to
improve event correlation across disparate network devices.
Question: What is the primary benefit of deploying a SIEM in this
context?
a) It encrypts data at rest.
b) It collects, correlates, and analyzes log data in real time for threat
detection.
c) It optimizes network throughput.
d) It replaces the need for firewalls.

Correct ANS: b) It collects, correlates, and analyzes log data in
3

, real time for threat detection.
Rationale: SIEM systems are designed to ingest logs from multiple
sources, correlate events, and provide rapid alerts, thereby enabling
proactive threat identification and incident response.

---

5. Case: A government agency is implementing multi-factor
authentication (MFA) into its secure access systems.
Question: Which of the following best describes what MFA
requires?
a) A strong password alone
b) Two or more of the following: something you know, something you
have, and something you are
c) A hardware token only
d) Exclusive reliance on biometric data

Correct ANS: b) Two or more of the following: something you know,
something you have, and something you are
Rationale: MFA combines multiple independent credentials to
verify a user’s identity, significantly reducing the risk of unauthorized
access even if one factor becomes compromised.

---

6. Case: A cybersecurity architect is tasked with encrypting large
volumes of data stored across various databases.
Question: Which encryption method is best suited in terms of
balancing security and performance for encrypting data at rest?
a) Asymmetric encryption (e.g., RSA)
b) Symmetric encryption (e.g., AES)
c) Hashing algorithms (e.g., SHA‑256)
d) Digital signatures

Correct ANS: b) Symmetric encryption (e.g., AES)
4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bankart Chamberlain College of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
150
Member since
2 year
Number of followers
31
Documents
4512
Last sold
1 week ago

3.6

21 reviews

5
9
4
0
3
9
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions