100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025

Beoordeling
-
Verkocht
-
Pagina's
37
Geüpload op
09-06-2025
Geschreven in
2024/2025

D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025D481 ITAS 5100 Security Foundations - OA Review (Qns & Ans) - WGU 2025

Instelling
Vak











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
9 juni 2025
Aantal pagina's
37
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Onbekend

Onderwerpen

Voorbeeld van de inhoud

D481 ITAS 5100 Security Foundations

Objective Assessment Review

(Questions & Solutions)

2025




1

, 1. Case: A multinational enterprise is designing its security
architecture using layered defenses to protect highly sensitive
customer data.
Question: Which approach best illustrates a “defense in depth”
strategy for defending against both internal and external threats?
a) Deploying only a perimeter firewall
b) Combining network segmentation, endpoint protection, SIEM
monitoring, and strict access controls
c) Relying solely on strong encryption for data at rest
d) Implementing antivirus software on all endpoints with no
additional controls

Correct ANS: b) Combining network segmentation, endpoint
protection, SIEM monitoring, and strict access controls
Rationale: Defense in depth relies on multiple redundant layers of
security such that breaching one layer does not compromise the
entire system. The ANS (b) integrates several controls—each
addressing different threat vectors—thus providing robust overall
protection.

---

2. Case: An organization is implementing a risk management
process to prioritize remedial actions against possible cybersecurity
threats.
Question: Which framework is most widely adopted for conducting
risk assessments in cybersecurity?
a) ISO 9001
b) NIST SP 800-37 Risk Management Framework
c) ITIL
d) COBIT

Correct ANS: b) NIST SP 800-37 Risk Management Framework
Rationale: NIST SP 800‑37 provides a comprehensive process for
2

,risk management that guides organizations through risk assessment,
mitigation, and monitoring, making it a cornerstone methodology in
cybersecurity.

---

3. Case: A financial institution must secure its online banking
services. The team is examining protocols ensuring data protection
during transmission.
Question: Which protocol is currently recommended to secure
web-based transactions?
a) SSL 3.0
b) TLS 1.2 (or TLS 1.3)
c) IPSec
d) PPTP

Correct ANS: b) TLS 1.2 (or TLS 1.3)
Rationale: TLS (Transport Layer Security) protocols are designed to
provide confidentiality and integrity in network communications. TLS
1.2 and TLS 1.3 replace less secure versions (like SSL) and are the
industry standard for securing web-based communications.

---

4. Case: A cybersecurity team is evaluating a new SIEM solution to
improve event correlation across disparate network devices.
Question: What is the primary benefit of deploying a SIEM in this
context?
a) It encrypts data at rest.
b) It collects, correlates, and analyzes log data in real time for threat
detection.
c) It optimizes network throughput.
d) It replaces the need for firewalls.

Correct ANS: b) It collects, correlates, and analyzes log data in
3

, real time for threat detection.
Rationale: SIEM systems are designed to ingest logs from multiple
sources, correlate events, and provide rapid alerts, thereby enabling
proactive threat identification and incident response.

---

5. Case: A government agency is implementing multi-factor
authentication (MFA) into its secure access systems.
Question: Which of the following best describes what MFA
requires?
a) A strong password alone
b) Two or more of the following: something you know, something you
have, and something you are
c) A hardware token only
d) Exclusive reliance on biometric data

Correct ANS: b) Two or more of the following: something you know,
something you have, and something you are
Rationale: MFA combines multiple independent credentials to
verify a user’s identity, significantly reducing the risk of unauthorized
access even if one factor becomes compromised.

---

6. Case: A cybersecurity architect is tasked with encrypting large
volumes of data stored across various databases.
Question: Which encryption method is best suited in terms of
balancing security and performance for encrypting data at rest?
a) Asymmetric encryption (e.g., RSA)
b) Symmetric encryption (e.g., AES)
c) Hashing algorithms (e.g., SHA‑256)
d) Digital signatures

Correct ANS: b) Symmetric encryption (e.g., AES)
4

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Bankart Chamberlain College of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
150
Lid sinds
2 jaar
Aantal volgers
31
Documenten
4512
Laatst verkocht
1 week geleden

3,6

21 beoordelingen

5
9
4
0
3
9
2
1
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen