Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU IT security fundamentals EXAM A+ GRADE ASSURED COMPLETE SOLUTIONS AND VERIFIED ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
38
Cijfer
A+
Geüpload op
20-04-2026
Geschreven in
2025/2026

WGU IT security fundamentals EXAM A+ GRADE ASSURED COMPLETE SOLUTIONS AND VERIFIED ANSWERS

Voorbeeld van de inhoud

EXAM

Exam Solution ga




WGU Course C836 Fundamentals of Information Securit
ga ga ga ga ga ga




y Quizlet by Brian MacFarlane 2026 A+ GRADE ASSURE
ga ga ga ga ga ga ga ga




D COMPLETE SOLUTIONS AND VERIFIED ANSWERS (A9
ga ga ga ga ga ga




937)




QUESTION 1 ga




Term
ANSWER

Definition



QUESTION 2 ga




Which cybersecurity term is defined as the potential for an attack on a resource? A Impa
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



ct B Vulnerability C Risk D Threat
ga ga ga ga ga ga




ANSWER

D



QUESTION 3 ga




Which security type deliberately exposes a system's vulnerabilities or resources to an at
ga ga ga ga ga ga ga ga ga ga ga ga



tacker? A Intrusion detection B Firewalls C Honeypots D Intrusion prevention
ga ga ga ga ga ga ga ga ga ga




ANSWER

C



QUESTION 4 ga




Which tool can be used to map devices on a network, along with their operating system
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



types and versions? A Packet sniffer B Packet filter C Port scanner D Stateful firewall
ga ga ga ga ga ga ga ga ga ga ga ga ga ga

,ANSWER

C



QUESTION 5 ga




Which web attack is a server-side attack? A Clickjacking B Cross-
ga ga ga ga ga ga ga ga ga ga



site scripting C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga ga




ANSWER

C



QUESTION 6 ga




An organization employs a VPN to safeguard its information. Which security principle is
ga ga ga ga ga ga ga ga ga ga ga ga ga



protected by a VPN? A Data in motion B Data at rest C Data in use D Data in storage
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga




ANSWER

A



QUESTION 7 ga




A malicious hacker was successful in a denial of service (DoS) attack against an instituti
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



on's mail server. Fortunately, no data was lost or altered while the server was offline. W
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



hich type of attack is this? A Modification B Fabrication C Interception D Interruption
ga ga ga ga ga ga ga ga ga ga ga ga ga




ANSWER

D



QUESTION 8 ga




A company has had several successful denial of service (DoS) attacks on its email server.
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



Which security principle is being attacked? A Possession B Integrity C Confidentiality D
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



Availability
ANSWER

D



QUESTION 9 ga




A new start-
ga ga



up company has started working on a social networking website. The company has mov
ga ga ga ga ga ga ga ga ga ga ga ga ga



ed all its source code to a cloud provider and wants to protect this source code from una
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga

,uthorized access. Which cyber defense concept should the start-
ga ga ga ga ga ga ga ga



up company use to maintain the confidentiality of its source code? A Alarm systems B Ac
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



count permissions C Antivirus software D File encryption
ga ga ga ga ga ga ga




ANSWER

D



QUESTION 10 ga




A company has an annual audit of installed software and data storage systems. During t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



he audit, the auditor asks how the company's most critical data is used. This determinati
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



on helps the auditor ensure that the proper defense mechanisms are in place to protect
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



critical data. Which principle of the Parkerian hexad is the auditor addressing? A Posses
ga ga ga ga ga ga ga ga ga ga ga ga ga



sion B Integrity C Authenticity D Utility
ga ga ga ga ga ga




ANSWER

D



QUESTION 11 ga




Which web attack is possible due to a lack of input validation? A Extraneous files B Click
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



jacking C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga




ANSWER

C



QUESTION 12 ga




Which file action implements the principle of confidentiality from the CIA triad? A Comp
ga ga ga ga ga ga ga ga ga ga ga ga ga



ression B Hash C Backup D Encryption
ga ga ga ga ga ga




ANSWER

D



QUESTION 13 ga




Which cyber defense concept suggests limiting permissions to only what is necessary to
ga ga ga ga ga ga ga ga ga ga ga ga ga



perform a particular task? A Authentication B Authorization C Defense in depth D Princi
ga ga ga ga ga ga ga ga ga ga ga ga ga



ple of least privilege
ga ga ga




ANSWER

D

, QUESTION 14 ga




A company institutes a new policy that "All office computer monitors must face toward e
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



mployees and must face away from doorways. The monitor screens must not be visible t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



o people visiting the office." Which principle of the CIA triad is this company applying? A
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



Availability B Confidentiality C Utility D Integrity
ga ga ga ga ga ga ga




ANSWER

B



QUESTION 15 ga




At a small company, an employee makes an unauthorized data alteration. Which compo
ga ga ga ga ga ga ga ga ga ga ga ga



nent of the CIA triad has been compromised? A Confidentiality B Authenticity C Integrity
ga ga ga ga ga ga ga ga ga ga ga ga ga g



D Availability
a ga




ANSWER

C



QUESTION 16 ga




An organization plans to encrypt data in transit on a network. Which aspect of data is th
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



e organization attempting to protect? A Integrity B Possession C Availability D Authentic
ga ga ga ga ga ga ga ga ga ga ga ga



ity
ANSWER

A



QUESTION 17 ga




Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga



A Availability B Identification C Integrity D Confidentiality
ga ga ga ga ga ga ga




ANSWER

C



QUESTION 18 ga




A company's website has suffered several denial of service (DoS) attacks and wishes to t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga



hwart future attacks. Which security principle is the company addressing? A Availability
ga ga ga ga ga ga ga ga ga ga ga g



B Authenticity C Confidentiality D Possession
a ga ga ga ga ga




ANSWER

A

Documentinformatie

Geüpload op
20 april 2026
Aantal pagina's
38
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
CramScram

Maak kennis met de verkoper

Seller avatar
CramScram Harvard University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
1
Documenten
2793
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen