Sociology > QUESTIONS & ANSWERS > WGU C836- Fundamentals of Information Security all Chapter Quiz Already Passed (All)
WGU C836- Fundamentals of Information Security all Chapter Quiz Already Passed Confidentiality ✔✔The Interception attack type most commonly affects which principle(s) of the CIA triad? Integr... ity and Availability ✔✔The Fabrication attack type most commonly affects which principle(s) of the CIA triad? Identify assets ✔✔What is the first and arguably one of the most important steps of the risk management process? Threat ✔✔Something that has the potential to cause harm to our assets is known as a(n) ________. Post-incident Activity ✔✔During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? Logical controls ✔✔Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. Something you have ✔✔A badge or token is considered what type of authentication? Something you know ✔✔A password or PIN is considered what type of authentication? Authentication ✔✔The set of methods we use to establish a claim of identity as being true is called ______. Something you are ✔✔A fingerprint is considered what type of authentication? Mutual ✔✔What type of authentication can prevent a man-in-the-middle attack? Permanence ✔✔The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________. Clickjacking ✔✔A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________. Capability-based security ✔✔What type of access control can prevent the confused deputy problem? Mandatory access control ✔✔Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization? Discretionary access control ✔✔A user who creates a network share and sets permissions on that share is employing which model of access control? Attribute-based access control ✔✔A VPN connection that is set to time out after 24 hours is demonstrating which model of access control? Auditing ✔✔What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse? Accountability ✔✔_______ provides us with the means to trace activities in our environment back to their source. [Show More]
Last updated: 2 years ago
Preview 1 out of 7 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU C836 BUNDLED EXAMS COMPLETE QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS
By Nutmegs 2 years ago
$20
13
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 16, 2022
Number of pages
7
Written in
This document has been written for:
Uploaded
Aug 16, 2022
Downloads
0
Views
118
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·