• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

CORRECT WELL DETAILED ANSWERSLATEST

WGU EXAM Dec 21, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

1

CORRECT WELL DETAILED ANSWERS|LATEST

PASS CIA Triad - ANSWER security concepts Confidentiality, Integrity, Availability

DAD - ANSWER Negative concept of the CIA triad Disclosure, alteration and denial

Parkerian Hexad - ANSWER more complex CIA triad possession , availability, confidentiality ,integrity, authenticity and utility.

Possession or Control - ANSWER physical disposition where data is stored example encryption causes a possession problem unencrypted causes a confidentiality problem and possession problem.

Authenticity - ANSWER data in question was attributed by the proper owner or creator example sending a email message that was altered so it appears to be the actual one violates authenticity.

Utility - ANSWER refers to how useful the data is to you

Interception - ANSWER unauthorized user access data, applications , or environments primarily attacks against confidentiality.

Interruption - ANSWER attacks make data unusable or unavailable ''temporary or permanent''

  • / 4

2

Modification - ANSWER attack involves tampering with an asset primarily considered attacks on integrity could also represent attacks on integrity could also represent attacks on availability

Fabrication - ANSWER attacks involved generating data, processes, communication or something similar with a system. affects integrity but could also affect availability.

Identify Assets - ANSWER knowing what dat consist of and evaluate the importance of each.

Identify Threats - ANSWER useful to use CIA Triad or Parkerian Hexad.

Confidentiality Ex - ANSWER Ex:when data is expose you could have a breach.

Integrity Ex - ANSWER Ex; If data becomes corrupt you may incorrectly process payments.

Availability Ex - ANSWER Ex; If the system or application goes down, you won't be able to process payments.

Possession Ex - ANSWER Ex; If you lose backup media you could potentially have a breach.

Authenticity Ex - ANSWER Ex;If you don't have authentic customer information you may process a fraudulent transaction.

Utility Ex - ANSWER Ex; If you collect invalid or incorrect data that dat will have limited utility.

  • / 4

3

Incident Response - ANSWER Preparation, detection and analysis containment, fabrication Recovery, post- incident activity

External Network - ANSWER DMZ, VPN, Logging,Auditing,Penetration testing, Vulnerability analysis

Network Perimeter - ANSWER Firewalls, proxy, Logging, Stateful Packet inspection, Auditing, Penetration testing, vulnerability analysis

Internal Network - ANSWER IDS, IPS, Logging, Auditing, Penetration testing, Vulnerability analysis

Host - ANSWER Authentication ,antivirus, firewall IDS,IPS, Password, Hashing, Logging auditing, Penetration testing, vulnerability analysis

DMZ - ANSWER Demilitarized zone exposes an organization external facing services to an untrusted usually lager network such as the internet.

IDS - ANSWER Intrusion Detection System works in the internal network

IPS - ANSWER Intrusion Prevention System works in the internal network

Application - ANSWER SSO, content filtering , data validation, auditing, penetration testing,vulnerability analysis

SSO - ANSWER Single sing-on

Data - ANSWER Encryption, access controls, backups, Penetration Testing, Vulnerability analysis. 3 / 4

4

Identification - ANSWER Assertion of who we are .

Authentication - ANSWER Set of methods use to establish or claim ones identity

FAR - ANSWER False Acceptance Rate

FRR - ANSWER False Rejection Rate

EER - ANSWER Equal Error Rate

Hardware Token - ANSWER small device , typically in general form factor size and shape of credit card or keychain fob, simple ones look identical to ''Universal Serial Bus USB'' and contain certificate or unique identifier often called ''dongles''

Complex hardware token - ANSWER incorporate liquid crystal display "LCD" security includes passwords, biometric readers, wireless device and additional features to enhance security

Mutual Authentication - ANSWER Both parties authenticate each other

Access Control - ANSWER for allowing access, denying access, limiting access and revoking access.

Sandboxes - ANSWER isolated environments containing a set of resources for a given purpose example Java virtual machine "JVM"

Access Control List (ACL) - ANSWER are a list containing info about what kind of access certain parties are allowed to have to a given system.

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

The practical examples offered by this document helped me ace my presentation. A excellent purchase!

Download Document

Buy This Document

$10.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: WGU EXAM
Added: Dec 21, 2025
Description:

CORRECT WELL DETAILED ANSWERS|LATEST PASS CIA Triad - ANSWER security concepts Confidentiality, Integrity, Availability DAD - ANSWER Negative concept of the CIA triad Disclosure, alteration and den...

Unlock Now
$ 10.00