WGU C726 Cybersecurity Architecture and Engineering
OBJECTIVE ASSESSMENT ACTUAL EXAM 2025/2026
COMPLETE QUESTIONS BANK AND CORRECT
DETAILED ANSWERS WITH RATIONALES || 100%
GUARANTEED PASS <NEWEST VERSION>
veneer security ......ANSWER........"Security functionality provided
without corresponding assurance so that the functionality only
appears to protect resources when, in fact, it does not."
virtual economy ......ANSWER........The economy associated with
digital assets such as property and gold within the virtual world
of gaming. Virtual currencies such as Bitcoin are also considered
part of the virtual economy.
virtual machine (VM) ......ANSWER........This term is ambiguous. (a)
It sometimes refers to the combination of the system hardware
,age 2 of 126
resources and the low-level operating system (called a
hypervisor) that is responsible for creating the illusion to
operating systems running on it that they have exclusive use of
the system. (b) A virtual machine can also refer to a guest
operating system running on top of a hypervisor.
virtual private cloud ......ANSWER........A cloud that appears to
be dedicated to a user but is in fact formed from a shared set
of hardware or virtual machines in a large cloud offered by a
cloud service provider. See also cloud computing.
virtualization ......ANSWER........"The process of presenting an
abstraction of hardware resources to give the appearance of
dedicated access and control to hardware resources, while, in
reality, those resources are being shared."
,age 3 of 126
virus ......ANSWER........Self-propagating malicious code that
requires a host program to replicate and propagate itself.
vulnerability ......ANSWER........The property of a system whereby
it is susceptible to a given attack succeeding against that system.
vulnerability testing ......ANSWER........The specialized testing of a
system to determine if known vulnerabilities are present and
exploitable.
weakest link principle ......ANSWER........The idea that an
adversary will evaluate the strength of all defenses in terms of
relative strength and always attack the weakest one.
wetware ......ANSWER........A humorous way to refer to
knowledge or a subprocess that is executed in the mind of
humans instead of in software.
, age 4 of 126
*-property ......ANSWER........A multilevel security policy that
prohibits processes operating on behalf of users from writing
any data below the level of their clearance.
abstraction ......ANSWER........The act of representing essential
features while hiding the details to reduce complexity.
access control list (ACL) ......ANSWER........"A data structure that
enumerates the access rights for all active entities (e.g., users)
within a system."
access control matrix ......ANSWER........"A two-dimensional matrix
with active accessing entities (e.g., processes) on one dimension
and resources (e.g., files) with access types (e.g., read, write,
and execute) entries in the intersecting cells, indicating the access
the active entity has to the corresponding resource."