WGU D482 PERFOMANCE
ASSESSMENT Exam Questions and
Answers Graded A+
A laptop has been stolen, and the data has been seen for sale on the darknet. Which
process could have protected the confidentiality of the data? - Correct answer-Hard
Drive Encryption
Classify each attack method in relation to its direct impact on the CIA triad. -
Correct answer-Key Logger: Confidentiality
DNS Poisoning: Integrity
Covert Channels: Confidentiality
DDoS: Availability
A security administrator has configured a small keysize to protect the VPN.
Which security objective does this affect? - Correct answer-Confidentiality
A laptop has been stolen, and the data has been seen for sale on the darknet.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
,Which process could have protected the confidentiality of the data? - Correct
answer-Hard Drive encryption
When browsing to a financial website, a user receives an error on the browser that
points to the certificate
on the website. The user reviews the certificate and maps it to a known certificate
authority.
Why did the user need to perform these actions? - Correct answer-To establish a
trust relationship
A team of scientists is working on a secure project. The network administrator
needs to configure a
network for the team that is not routable from the Internet. A firewall is protecting
the scientists' network
and is using network address translation (NAT) to translate the internal IP
addresses to public IP
addresses.
Which IP address should the network administrator configure on the inside
interface of the firewall? - Correct answer-10.14.15.16
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
, An ad hoc network design team has just finished a presentation on the latest
updates to the organization's
network infrastructure. The team ensured that plenty of redundancy has been built
in and bottlenecks
have been eliminated.
Which security objective has the team bolstered through these improvements? -
Correct answer-Availability
A company has recently implemented a new email encryption system that uses
public key infrastructure
(PKI). The company is now requiring all employees to sign and encrypt internal
communication. An
employee wants to send a digitally signed message to the IT director.
What does the IT director use to decode the employee's signature under the new
system? - Correct answer-The employee's public key
An administrator at a small office is tasked with supporting a new time clock that
has been installed on the
network. The outsourced company managing the time clock states that the
connection protocol it uses
©COPYRIGHT 2025, ALL RIGHTS RESERVED 3
ASSESSMENT Exam Questions and
Answers Graded A+
A laptop has been stolen, and the data has been seen for sale on the darknet. Which
process could have protected the confidentiality of the data? - Correct answer-Hard
Drive Encryption
Classify each attack method in relation to its direct impact on the CIA triad. -
Correct answer-Key Logger: Confidentiality
DNS Poisoning: Integrity
Covert Channels: Confidentiality
DDoS: Availability
A security administrator has configured a small keysize to protect the VPN.
Which security objective does this affect? - Correct answer-Confidentiality
A laptop has been stolen, and the data has been seen for sale on the darknet.
©COPYRIGHT 2025, ALL RIGHTS RESERVED 1
,Which process could have protected the confidentiality of the data? - Correct
answer-Hard Drive encryption
When browsing to a financial website, a user receives an error on the browser that
points to the certificate
on the website. The user reviews the certificate and maps it to a known certificate
authority.
Why did the user need to perform these actions? - Correct answer-To establish a
trust relationship
A team of scientists is working on a secure project. The network administrator
needs to configure a
network for the team that is not routable from the Internet. A firewall is protecting
the scientists' network
and is using network address translation (NAT) to translate the internal IP
addresses to public IP
addresses.
Which IP address should the network administrator configure on the inside
interface of the firewall? - Correct answer-10.14.15.16
©COPYRIGHT 2025, ALL RIGHTS RESERVED 2
, An ad hoc network design team has just finished a presentation on the latest
updates to the organization's
network infrastructure. The team ensured that plenty of redundancy has been built
in and bottlenecks
have been eliminated.
Which security objective has the team bolstered through these improvements? -
Correct answer-Availability
A company has recently implemented a new email encryption system that uses
public key infrastructure
(PKI). The company is now requiring all employees to sign and encrypt internal
communication. An
employee wants to send a digitally signed message to the IT director.
What does the IT director use to decode the employee's signature under the new
system? - Correct answer-The employee's public key
An administrator at a small office is tasked with supporting a new time clock that
has been installed on the
network. The outsourced company managing the time clock states that the
connection protocol it uses
©COPYRIGHT 2025, ALL RIGHTS RESERVED 3