{"id":113718,"date":"2023-08-16T03:27:27","date_gmt":"2023-08-16T03:27:27","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=113718"},"modified":"2023-08-16T03:27:29","modified_gmt":"2023-08-16T03:27:29","slug":"wgu-c842-cyber-defense-and-counter-measures-final-exam-2023-questions-and-answers-verified-answers","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/16\/wgu-c842-cyber-defense-and-counter-measures-final-exam-2023-questions-and-answers-verified-answers\/","title":{"rendered":"WGU C842 Cyber Defense and Counter Measures FINAL EXAM 2023 Questions and Answers (Verified Answers)"},"content":{"rendered":"\n<p>1 \/ 25<br>WGU C842 \u2013 Cyber Defense and Counter Measures TEST<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability ANS : B<\/li>\n\n\n\n<li>Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation ANS : A<\/li>\n\n\n\n<li>John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<\/li>\n<\/ol>\n\n\n\n<p>2 \/ 25<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake ANS : B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous<br>policy B prudent<br>policy<br>C paranoid policy<br>D permissive policy ANS : A<\/li>\n\n\n\n<li>Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 25<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3 ANS : A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and<br>assignment B incident containment<br>C post-incident activities<br>D incident triage ANS : D<\/li>\n\n\n\n<li>Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision<br>ANS : D<\/li>\n\n\n\n<li>Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/li>\n<\/ol>\n\n\n\n<p>4 \/ 25<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision ANS :<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li>Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data<br>availability D<br>notifications ANS<br>: D<\/li>\n\n\n\n<li>John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats and risks.<br><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>1 \/ 25WGU C842 \u2013 Cyber Defense and Counter Measures TEST 2 \/ 25on organizational assets.Identify the security strategy John has implemented.A covert channelB defense-in-depthC likelihood analysisD three-way handshake ANS : B 3 \/ 25A CAT 4B CAT 2C CAT 1D CAT 3 ANS : A 4 \/ 25A IH&amp;R missionB IH&amp;R staffingC IH&amp;R team [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-113718","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113718","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=113718"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113718\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=113718"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=113718"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=113718"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}