MULTI/COMPREHENSIVE
FINAL EXAM REVIEW
QUESTIONS AND ANSWERS
RATED 100% CORRECT!!
WGU C838
Evatee 7/2/24 WGU C836
,WGU C836 MULTI/COMPREHENSIVE FINAL EXAM
REVIEW QUESTIONS AND ANSWERS RATED 100%
CORRECT!!
The Fabrication attack type most commonly affects which principle(s) of the
CIA triad?
A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and Integrity Answer - Integrity and Availability
The Interception attack type most commonly affects which principle(s) of the
CIA triad? This task contains the radio buttons and checkboxes for options. The
shortcut keys to perform this task are A to H and alt+1 to alt+9.
A.Integrity and Availability
B.Confidentiality and Integrity
C.Availability
D.Integrity
,E.Confidentiality Answer - Confidentiality
Something that has the potential to cause harm to our assets is known as a(n)
________.
A.Threat
B.Impact
C.Risk
D.Vulnerability Answer - Threat
Controls that protect the systems, networks, and environments that process,
transmit, and store our data are called _______.
A.Logical controls
B.Administrative controls
C.Physical controls Answer - Logical Control
What is the first and arguably one of the most important steps of the risk
management process?
A.Assess risks
B.Mitigate risks
C.Identify threats
D.Assess vulnerabilities
E.Identify assets Answer - Identify assets
Protects information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction Answer - information
security
, A type of attack, primarily against confidentiality Answer - Interception
Something that has the potential to cause harm to our assets Answer - Threat
A weakness that can be used to harm us Answer - Vulnerability
The likelihood that something bad will happen Answer - Risk
An attack that involves tampering with our assets Answer - Modification attack
A model that adds three more principles to the CIA triad: possession or control,
utility, and authenticity Answer - Parkerian hexad
The physical disposition of the media on which the data is stored Answer -
Possession or control
An attack that involves generating data, processes, communications, or other
similar activities with a system Answer - Fabrication attack
A multilayered defense that will allow us to achieve a successful defense should
one or more of our defensive measures fail Answer - Defense in depth
Sometimes called technical controls, these protect the systems, networks, and
environments that process, transmit, and store our data Answer - Logical
controls