1 / 25
WGU C842 – Cyber Defense and Counter Measures TEST
- Which of the following information security elements ensures that the
information is accessible only to those who are authorized to have
access?
A authenticity
B confidentiality
C integrity
D availability ANS : B - Identify the information security element that determines
trustworthiness of data or resources in terms of preventing improper and
unauthorized changes.
A integrity
B availability
C authenticity
D non-repudiation ANS : A - John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout
an information system to help minimize any adverse impact from attacks
2 / 25
on organizational assets.
Identify the security strategy John has implemented.
A covert channel
B defense-in-depth
C likelihood analysis
D three-way handshake ANS : B
- Identify the security policy that doesn’t keep any restrictions on the
usage of system resources.
A promiscuous
policy B prudent
policy
C paranoid policy
D permissive policy ANS : A - Carl is trying to violate the acceptable use of a network and computer
use policy. Under which category of the incident handling criteria does
this scenario fall?
3 / 25
A CAT 4
B CAT 2
C CAT 1
D CAT 3 ANS : A
- In which of the following stages of incident handling does
classification and prioritization of incidents take place?
A incident recording and
assignment B incident containment
C post-incident activities
D incident triage ANS : D - Which of the following terms reflects an organization’s mid-term
and long-term goals for incident management capabilities?
A IH&R team models
B IH&R mission
C IH&R staffing
D IH&R vision
ANS : D - Which of the following terms defines the purpose and scope of the
planned incident handling and response capabilities?
4 / 25
A IH&R mission
B IH&R staffing
C IH&R team models
D IH&R vision ANS :
A
- Which of the following backup strategies provides daily status of the
backup situation, such as successful, unsuccessful, not run, out of
space, etc.?
A security
B guarantee
C data
availability D
notifications ANS
: D - John is an incident response manager at XYZ Inc. As a part of IH&R
policy of his organization, he signed a contract between the organization
and a third-party insurer to protect organization individuals from different
threats and risks.