• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DETAILED ANSWERSLATEST

WGU EXAM Dec 21, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

1

DETAILED ANSWERS|LATEST

PASS CIA Triad - ANSWER Confidential - allowing only those authorized to access the data requested Integrity - keeping data unaltered in an unauthorized manner and reliable Availability - the ability for those authorized to access data when needed

Parkerian Hexad - ANSWER Confidentiality Integrity Availability Possession - physical deposition of the media on which the data is stored Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data in question Utility - how useful the data is to us

Attack Types - ANSWER Interception Interruption Modification Fabrication

Interception - ANSWER an attacker has access to data , applications or environment

Interruption - ANSWER attacks cause our assets to become unusable or unavailable

Modification - ANSWER attacks involve tampering with our asset

  • / 2

2

Fabrication - ANSWER attacks that create false information

Threat - ANSWER something that has potential to cause harm

Vulnerability - ANSWER weaknesses that can be used to harm us

Something you know - ANSWER username , password , PIN

Something you have - ANSWER ID badge , swipe card , OTP

Something you are - ANSWER fingerprint, Iris Retina scan

Somewhere you are - ANSWER geolocation

Something you do - ANSWER handwriting , typing , walking

Authentication - ANSWER verifying that a person is who they claim to be

Mutual authentication - ANSWER Both parties in a transaction to authenticate each other

  • Has digital certificates
  • Prevents man in the middle attacks
  • The man in the middle is where the attacker inserts themselves into the traffic flow
  • Ex . Both the PC and server authenticate each other before data is sent in either direction

Risk management process - ANSWER 1. Identify Asset - identifying and categorizing assets that we're protecting

  • / 2

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

This document provided detailed explanations, which was incredibly useful for my research. Absolutely superb!

Download Document

Buy This Document

$10.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: WGU EXAM
Added: Dec 21, 2025
Description:

DETAILED ANSWERS|LATEST PASS CIA Triad - ANSWER Confidential - allowing only those authorized to access the data requested Integrity - keeping data unaltered in an unauthorized manner and reliable ...

Unlock Now
$ 10.00