100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

Puntuación
-
Vendido
-
Páginas
46
Grado
A+
Subido en
01-12-2024
Escrito en
2024/2025

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Libro relacionado

Escuela, estudio y materia

Grado

Información del documento

Subido en
1 de diciembre de 2024
Número de páginas
46
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C715 Practice Exam: C715 Pre-Assesment : Questions & Answers

At a small company, an employee makes an unauthorized data alteration.



Integrity

Confidentiality

Availability

Authenticity - ANSWER:Integrity

An organization plans to encrypt data in transit on a network.



Which aspect of data is the organization attempting to protect?



Authenticity

Possession

Availability

Integrity - ANSWER:Integrity

Which aspect of the CIA triad is violated by an unauthorized database roll back or undo?



Integrity

Confidentiality

Availability

Identification - ANSWER:Integrity

A company's website has suffered several denial of service (DoS) attacks and wishes to thwart future
attacks.



Which security principle is the company addressing?



Availability

Confidentiality

,Possession

Authenticity - ANSWER:Availability

An organization has a requirement that all database servers and file servers be configured to maintain
operations in the presence of a failure.



Which principle of the CIA triad is this requirement implementing?



Availability

Confidentiality

Utility

Integrity - ANSWER:Availability

Which tool can be used to map devices on a network, along with their operating system types and
versions?



Port scanner

Stateful firewall

Packet filter

Packet sniffer - ANSWER:Port scanner

Which web attack is a server-side attack?



SQL injection

Cross-site scripting

Cross-site request forgery

Clickjacking - ANSWER:SQL injection

A new start-up company has started working on a social networking website. The company has moved all
its source code to a cloud provider and wants to protect this source code from unauthorized access.



Which cyber defense concept should the start-up company use to maintain the confidentiality of its
source code?

,File encryption

Alarm systems

Antivirus software

Account permissions - ANSWER:File encryption

A company has an annual audit of installed software and data storage systems. During the audit, the
auditor asks how the company's most critical data is used. This determination helps the auditor ensure
that the proper defense mechanisms are in place to protect critical data.



Which principle of the Parkerian hexad is the auditor addressing?



Utility

Possession

Authenticity

Integrity - ANSWER:Utility

Which web attack is possible due to a lack of input validation?



SQL injection

Cross-site request forgery

Clickjacking

Extraneous files - ANSWER:SQL injection

Which cybersecurity term is defined as the potential for an attack on a resource?



Threat

Vulnerability

Risk

Impact - ANSWER:Threat

Which security type deliberately exposes a system's vulnerabilities or resources to an attacker?



Intrusion detection

, Intrusion prevention

Firewalls

Honeypots - ANSWER:Honeypots

An organization employs a VPN to safeguard its information.



Which security principle is protected by a VPN?



Data in motion

Data in storage

Data at rest

Data in use - ANSWER:Data in motion

A malicious hacker was successful in a denial of service (DoS) attack against an institution's mail server.
Fortunately, no data was lost or altered while the server was offline.



Which type of attack is this?



Interruption

Interception

Modification

Fabrication - ANSWER:Interruption

A company has had several successful denial of service (DoS) attacks on its email server.



Which security principle is being attacked?



Availability

Confidentiality

Integrity

Possession - ANSWER:Availability

Which file action implements the principle of confidentiality from the CIA triad?
$18.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TEACHME3 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
7
Miembro desde
1 año
Número de seguidores
0
Documentos
499
Última venta
7 meses hace
TEACH ME 2

Welcome to TestBanksGuru, your go-to source for high-quality test banks and study materials designed to help you excel academically. We offer a comprehensive range of resources including test banks, study guides, solution manuals, and other study materials, all meticulously curated to ensure accuracy and effectiveness. Our affordable, instantly accessible materials are complemented by excellent customer support, making your learning experience seamless and efficient. Trust Testbanksguru to be your partner in academic success, providing the tools you need to achieve your educational goals.

Lee mas Leer menos
4.2

419 reseñas

5
210
4
126
3
56
2
19
1
8

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes