100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW Questions AND Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
29
Cijfer
A+
Geüpload op
20-11-2025
Geschreven in
2025/2026

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW Questions AND Correct Answers

Instelling
WGU C836
Vak
WGU C836










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C836
Vak
WGU C836

Documentinformatie

Geüpload op
20 november 2025
Aantal pagina's
29
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW
Questions AND Correct Answers
______ regulates the financial practice and governance of corporations. This task contains the radio
buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.



A.GLBA

B.FISMA

C.SOX

D.FERPA

E.HIPAA - ✔✔C.SOX



_______ provides us with the means to trace activities in our environment back to their source. This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H
and alt+1 to alt+9.



A.Access

B.Authentication

C.Accountability

D.Authorization

E.Nonrepudiation - ✔✔C.Accountability



_____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety of
wired and wireless sources.



A.Wireshark

B.Kismet

C.Hping3

D.NetStumbler - ✔✔A.Wireshark

,_____________ is a sniffer that specializes in detecting wireless devices.



A.Hping3

B.Kismet

C.Wireshark

D.NetStumbler - ✔✔B.Kismet



A combination of a network design feature and a protective device such as a firewall; often used for
systems that need to be exposed to external networks but are connected to our network (such as a web
server) - ✔✔Demilitarized Zone (DMZ)



A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two
security properties define how information can flow to and from the resource: the simple security
property and the * property. - ✔✔The Bell-LaPadula model



A database is vulnerable to SQL injection attacks through direct attempts to the database server or
through applications software, including web applications. What is the most effective way of mitigating
these attacks?



A.Authenticating the user on the client-side

B.Authenticating the user on the server-side

C.Keeping the software patched

D.Turning on database logging

E.Validating user inputs - ✔✔E.Validating user inputs



A firewall technology that can analyze the actual content of the traffic that is flowing through - ✔✔Deep
packet inspection



A firewall technology that functions on the same general principle as packet filtering firewalls, but is able
to keep track of the traffic at a granular level. Has the ability to watch the traffic over a given connection
- ✔✔Stateful packet inspection

, A firewall technology that inspects the contents of each packet in network traffic individually and makes
a gross determination (based on source and destination IP address, port number, and the protocol being
used) of whether the traffic should be allowed to pass - ✔✔Packet filtering



A firewall that can watch packets and monitor the traffic from a given connection is using what kind of
firewall technology?



A.Deep packet inspection

B.Stateful packet inspection

C.Packet filtering - ✔✔B.Stateful packet inspection



A fully featured sniffer that is also a great tool for troubleshooting traffic; this well-known tool is used by
many network operations and security teams - ✔✔Wireshark



A group of tools that can include network mapping tools, sniffers, and exploits - ✔✔Exploit framework



A hardware- and software-based technology that prevents certain portions of the memory used by the
operating system and applications from being used to execute code - ✔✔Executable space protection



A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity -
✔✔Parkerian hexad



A multilayered defense that will allow us to achieve a successful defense should one or more of our
defensive measures fail - ✔✔Defense in depth



A particularly complex and impactful item of malware that targeted the Supervisory Control and Data
Acquisition (SCADA) systems that run various industrial processes; this piece of malware raised the bar
for malware from largely being a virtual-based attack to actually being physically destructive -
✔✔Stuxnet



A phrase that refers to an organization's strategy and policies regarding the use of personal vs.
corporate devices - ✔✔Bring your own device (BYOD
€11,05
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
ExamsCentre
4,0
(2)

Maak kennis met de verkoper

Seller avatar
ExamsCentre New Yo
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
8 maanden
Aantal volgers
0
Documenten
1644
Laatst verkocht
15 uur geleden

4,0

2 beoordelingen

5
1
4
0
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen