1 / 10
WGU C842 OBJECTIVE ASSESSMENT 2023
1.A security committee at an organization develops a security plan.
Numer- ous security control types are in place. The organization utilizes a
training program to provide best practices training to all employees. The
committee uses which category to define the program ANS Operational
2.Too often, employees use the datacenter for overflow storage of office
sup- plies. Management uses warning signs to prevent employees from
entering a datacenter. Management has implemented which control type to
tighten security ANS Physical
3.It is important to assess sources when adding information to a data
set. Considering threat intelligence, this data is likely to derive from
external sources. Which factor is key in disseminating updates ANS
Relevancy
4.Numerous energy companies experience cyber attacks in a short period
of time. Analysts that investigate the attacks categorize the threats as
coming from which actor type ANS Nation-state
2 / 10
5.A company abruptly terminates an employee. The employee harbors a
known grievance as a result of the company’s actions. Considering
threat types, which two classify the ex-employee? Select all that apply
ANS Insider Outsider
6.Engineers analyze previous hacks and intrusions to produce definitions
of the tactics, techniques, and procedures (TTP) used to perform attacks.
When evaluating data, the engineers classify which attack based on the
behavior of increased network traffic ANS Data exfiltration
7.Threat intelligence reveals a new type of malware is infecting Windows
desktops in many companies. Security specialists at a company initiate
threat hunting activities to investigate a potential infection. Which areas
do the engineers investigate in implementing the hunt? Select all that
apply ANS – Network traffic
Process Lists
8.A systems engineer at an organization tightens security by enabling
sandboxing on a crucial system. This measure is in place to help prevent
ransomware. Which valid features does the engineer enable on the
system? Select all that apply ANS Monitor network sockets
Periodic snapshots
3 / 10
9.In contrast to traditional packet sniffing, Zeek, a packet capture tool,
offers which benefits? Select all that apply ANS Log only data of potential
interests Reduce storage requirements