Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU CLOUD & NETWORK SECURITY (C842 / C845 EQUIVALENT) : QUESTIONS AND RATIONALES/GRADED A+ UPDATE 100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
05-05-2026
Geschreven in
2025/2026

WGU CLOUD & NETWORK SECURITY (C842 / C845 EQUIVALENT) : QUESTIONS AND RATIONALES/GRADED A+ UPDATE 100% CORRECT

Instelling
2026
Vak
2026

Voorbeeld van de inhoud

WGU CLOUD & NETWORK
SECURITY (C842 / C845
EQUIVALENT) : QUESTIONS AND
RATIONALES/GRADED A+
UPDATE 100% CORRECT




SECTION I: CORE SECURITY CONCEPTS & GOVERNANCE (Qs 1-
10)
1. A multinational organization is implementing a "Cyber Resilience" strategy for
2026. Which metric best indicates successful resilience against a ransomware attack
that encrypted 90% of endpoints?
A) Mean Time to Detect (MTTD) of 2 hours
B) Recovery Time Objective (RTO) met within 4 hours without paying ransom
C) Number of firewall alerts generated per day
D) Total cost of the backup software license

Correct Answer: B – Cyber resilience prioritizes recovery over prevention. Meeting
RTO without ransom proves operational continuity despite compromise.

2. In the shared responsibility model for a SaaS application (e.g., Microsoft 365),
which security control remains solely the customer's responsibility in 2026?
A) Physical security of data center hard drives
B) Patching the underlying hypervisor
C) Configuration of Conditional Access policies
D) Encryption of data at rest within the database

Correct Answer: C – Identity and access configuration (Conditional Access, MFA) is
always customer-owned. The provider handles physical, hypervisor, and platform
encryption.

,3. A CISO is adopting the NIST Cybersecurity Framework (CSF) 2.0 released in 2024.
Which new "Govern" function pillar requires the board of directors to be explicitly
accountable for cyber risk?
A) Identify
B) Protect
C) Detect
D) Govern

Correct Answer: D – NIST CSF 2.0 elevated "Govern" (GV) to a core function,
mandating senior executive and board oversight of cyber risk management as a
business priority.

4. Which attack specifically undermines the integrity of a Large Language Model
(LLM) used for security log analysis by injecting malicious prompts?
A) Prompt Injection
B) SQL Injection
C) Cross-Site Scripting (XSS)
D) ARP Poisoning

Correct Answer: A – Prompt injection manipulates LLM outputs (e.g., hiding an
attack from a SOC analyst). This is the OWASP Top 10 for LLM #1.

5. A cloud security architect is implementing a "Zero Trust" architecture. Which
principle is most critical for preventing lateral movement after a web server
compromise?
A) A single, large VPN tunnel for all employees
B) Micro-segmentation with per-application firewalls
C) Annual password changes
D) A honeypot in the DMZ

Correct Answer: B – Zero Trust mandates "never trust, always verify." Micro-
segmentation prevents a compromised server from communicating with the
database server.

6. Which compliance regulation imposes the strictest reporting requirements for data
breaches involving EU citizens' biometric data processed by an AI system?
A) PCI DSS v4.0
B) HIPAA
C) GDPR (Art. 33 & 34)
D) SOX

Correct Answer: C – GDPR has a 72-hour breach notification rule and specifically
covers "special categories" of data like biometrics processed by AI.

, 7. A Security Operations Center (SOC) is struggling with alert fatigue. Which
technology best reduces false positives by using AI to learn normal user behavior?
A) Signature-based IPS
B) User and Entity Behavior Analytics (UEBA)
C) Static vulnerability scanner
D) Web Application Firewall (WAF)

Correct Answer: B – UEBA establishes behavioral baselines; deviations (e.g., a
backup account logging in at 3 AM) trigger alerts, reducing noise from static rules.

8. What is the primary security advantage of "Confidential Computing" in a multi-
tenant cloud environment?
A) It prevents SQL injection.
B) It encrypts data while it is being processed (in-use) using hardware TEEs.
C) It replaces the need for TLS certificates.
D) It blocks DDoS attacks at the edge.

Correct Answer: B – Confidential Computing uses Trusted Execution Environments
(TEEs) like Intel SGX or AMD SEV to encrypt RAM, protecting data from the cloud
provider's own admins.

9. Which of the following is a "post-quantum" cryptographic algorithm selected by
NIST for general encryption, designed to resist Shor's algorithm?
A) RSA-4096
B) ECDSA
C) CRYSTALS-Kyber
D) MD5

Correct Answer: C – Kyber (now standardized as ML-KEM) is lattice-based and
resistant to quantum computer attacks. RSA and ECC will be broken by quantum.

10. A DevSecOps team finds hardcoded credentials in a public GitHub repository.
What is the immediate response per incident response playbooks?
A) Change the commit history.
B) Rotate the compromised credentials immediately
C) Delete the repository
D) Send an email to the developer

Correct Answer: B – Credentials are considered compromised once public. Rotation
is the only way to invalidate the leak. History rewriting does not remove cloned
copies.

Geschreven voor

Instelling
2026
Vak
2026

Documentinformatie

Geüpload op
5 mei 2026
Aantal pagina's
22
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$28.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
trustednurse NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
928
Lid sinds
2 jaar
Aantal volgers
407
Documenten
9047
Laatst verkocht
9 uur geleden

On this platform, you will discover a variety of meticulously crafted study materials, including detailed documents, comprehensive bundles, and expertly designed flashcards provided by the seller, Trustednurse. These resources are thoughtfully prepared to support your learning journey and make your studies and exam preparations smooth and effective. I am here to offer any assistance or answer any questions you may have regarding your academic needs. Please don’t hesitate to reach out for guidance or support—I am more than happy to help you achieve success in your courses and exams. Wishing you a seamless and rewarding learning experience. Thank you so much for choosing these resources!

Lees meer Lees minder
4.9

2498 beoordelingen

5
2395
4
30
3
35
2
15
1
23

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen