• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WELL DETAILED ANSWERSLATEST

WGU EXAM Dec 21, 2025
Loading...

Loading document viewer...

Page 0 of 0

Document Text

1

WELL DETAILED ANSWERS|LATEST

PASS Confidentiality (CIA Triad) - ANSWER refers to our ability to protect our data from those who are not authorize to use/view it.

intergrity ( CIA Triad ) - ANSWER is the ability to prevent people from changing your data in an unauthorized or undesirable manner

availability ( CIA Triad) - ANSWER refers to the ability to access our data when we need it.

The Parkerian Hexad - ANSWER a less well-known model named after Donn Parker. A complex variation of the the classic CIA triad. It Consists of Confidentiality, integrity, availability as well as possession or control, authenticity, and utility. A total of 6 principles.

possesion or control ( the parkerian Hexad) - ANSWER refers to the physical disposition of the media on which the data is stored.

authenticity ( the parkerian Hexad) - ANSWER allows you to say whether you've attributed the data in question to the proper owner or creator

Utility ( the parkerian Hexad) - ANSWER refers how useful data is to you. is also the only the parkerian Hexad that is not necessarily binary in nature. can have a variety of degrees

interceptions ( four types of attacks) - ANSWER this attack allows unauthorized users to access your data, applications, or environments, and they are primarily attacks against confidentiality 1 / 2

2

Data at Rest - ANSWER is stored data that is not in the process of being moved from one place to another

Data in motion - ANSWER is data that is moving from one place to another. usually protected by encryption

interruption ( four types of attacks) - ANSWER make your assets unusable or unavailable to you on a temporary or permeant basis ( these types of attacks often affect availability but can affect integrity, as well)

modification ( four types of attacks ) - ANSWER involves tampering with an asset. Such attacks might primarily be considered attacks on integrity but could also represents attacks on availability.

Fabrication ( four types of attacks) - ANSWER attacks involve generating data, processes, communications, or other similar material with a system. Ex, generating fake information in a database. primarily affects integrity but could affect availability, as well

Threats - ANSWER is something that has the potential to cause harm to your assets

Vunerabilities - ANSWER are weaknesses, or holes, that threats can exploit to cause you harm.

Risk - ANSWER is the likelihood that something bad will happen. for you to have a R____environment you need to have both a threat and a vulnerability that the threat could exploit.

Impact - ANSWER takes into account the value of the asset being threatened and uses it to calculate risk.

  • / 2

User Reviews

Login to Review

No reviews yet. Be the first to share your thoughts!

Download Document

Buy This Document

$10.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: WGU EXAM
Added: Dec 21, 2025
Description:

WELL DETAILED ANSWERS|LATEST PASS Confidentiality (CIA Triad) - ANSWER refers to our ability to protect our data from those who are not authorize to use/view it. intergrity ( CIA Triad ) - ANSWER i...

Unlock Now
$ 10.00