Sociology > QUESTIONS & ANSWERS > WGU C836- Fundamentals of Information Security all Chapter Quiz Already Passed (All)

WGU C836- Fundamentals of Information Security all Chapter Quiz Already Passed

Document Content and Description Below

WGU C836- Fundamentals of Information Security all Chapter Quiz Already Passed Confidentiality ✔✔The Interception attack type most commonly affects which principle(s) of the CIA triad? Integr... ity and Availability ✔✔The Fabrication attack type most commonly affects which principle(s) of the CIA triad? Identify assets ✔✔What is the first and arguably one of the most important steps of the risk management process? Threat ✔✔Something that has the potential to cause harm to our assets is known as a(n) ________. Post-incident Activity ✔✔During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? Logical controls ✔✔Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. Something you have ✔✔A badge or token is considered what type of authentication? Something you know ✔✔A password or PIN is considered what type of authentication? Authentication ✔✔The set of methods we use to establish a claim of identity as being true is called ______. Something you are ✔✔A fingerprint is considered what type of authentication? Mutual ✔✔What type of authentication can prevent a man-in-the-middle attack? Permanence ✔✔The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________. Clickjacking ✔✔A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________. Capability-based security ✔✔What type of access control can prevent the confused deputy problem? Mandatory access control ✔✔Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization? Discretionary access control ✔✔A user who creates a network share and sets permissions on that share is employing which model of access control? Attribute-based access control ✔✔A VPN connection that is set to time out after 24 hours is demonstrating which model of access control? Auditing ✔✔What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse? Accountability ✔✔_______ provides us with the means to trace activities in our environment back to their source. [Show More]

Last updated: 2 years ago

Preview 1 out of 7 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

WGU C836 BUNDLED EXAMS COMPLETE QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS

WGU C836 BUNDLED EXAMS COMPLETE QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS

By Nutmegs 2 years ago

$20

13  

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

118
0

Document information


Connected school, study & course


About the document


Uploaded On

Aug 16, 2022

Number of pages

7

Written in

Seller


seller-icon
Nutmegs

Member since 4 years

620 Documents Sold

Reviews Received
77
14
8
2
21
Additional information

This document has been written for:

Uploaded

Aug 16, 2022

Downloads

 0

Views

 118

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·