• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CORRECT WELL DETAILED ANSWERSLATEST

WGU EXAM Dec 21, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

1

CORRECT WELL DETAILED ANSWERS|LATEST

PASS Which type of system is considered absolutely secure? - ANSWER A system that is shut off and disconnected from all networks.

Which concept of the CIA Triad is associated with reliability? - ANSWER Integrity

A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected? - ANSWER Confidentiality

A user changes a number in a dataset with a typo. Which side of the CIA triad is most affected? - ANSWER Integrity

What is an example of identification? - ANSWER Username

What are three forms of authentication? Choose three answers. - ANSWER 4 digit pin.Text of 6-digit number to phone. Fingerprint.

What is an example of identification? - ANSWER Email Address

What is an example of authentication? user name? mothers maiden name? write access? or email address? - ANSWER mother's maiden name

What is the final step in allowing access to resources? - ANSWER Authorization

  • / 2

2

Which example demonstrates access control? - ANSWER Locking and unlocking the doors of your house.

Which type of access control model is a CAPTCHA an example of? - ANSWER Attribute- based

What is a sandbox? - ANSWER An isolated environment that protects a set of resources

Which characteristic falls under accountability? Utility? Interruption? Integrity? Identity? - ANSWER Identity

Which tool is used for vulnerability assessment? - ANSWER Qualys

Which standards apply to any financial entity policies? - ANSWER Gramm-Leech-Bliley

What company audits other companies for licensing requirements? - ANSWER BSA

Which term is synonymous with symmetric cryptography? - ANSWER Secret key cryptography

Which term is synonymous with asymmetric cryptography? - ANSWER Public key cryptography

What are hash functions used for? - ANSWER Determining whether the message has changed

Which method is used to protect data at rest? - ANSWER Encryption

  • / 2

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

The in-depth analysis offered by this document helped me ace my presentation. A outstanding purchase!

Download Document

Buy This Document

$10.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: WGU EXAM
Added: Dec 21, 2025
Description:

CORRECT WELL DETAILED ANSWERS|LATEST PASS Which type of system is considered absolutely secure? - ANSWER A system that is shut off and disconnected from all networks. Which concept of the CIA Triad...

Unlock Now
$ 10.00