New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

WGU (QGC2) Information Technology Management Exam - Topic 2 Question 3 Discussion

Actual exam question for WGU's WGU (QGC2) Information Technology Management exam
Question #: 3
Topic #: 2
[All WGU (QGC2) Information Technology Management Questions]

What is an advantage of using a trusted third party to confirm correlations between users and public keys in disaster recovery planning?

Show Suggested Answer Hide Answer
Suggested Answer: C

Role of a Trusted Third Party:

Trusted third parties, like Certificate Authorities (CAs), validate the correlation between users and public keys.

They ensure secure communication by providing authentication (verifying user identity) and authorization (granting access rights).

Advantages in Disaster Recovery Planning:

Simplifies secure communication during recovery processes.

Provides a trusted mechanism for verifying identities and preventing unauthorized access.

Why Other Options Are Incorrect:

Option A (Monitors enclosures): Not related to public key verification.

Option B (Protects against encrypted attacks): While encryption enhances security, it is not the purpose of a trusted third party.

Option D (Features full-time monitoring): Not a function of trusted third parties like CAs.

:

Public Key Infrastructure (PKI) Best Practices -- NIST SP 800-32

Role of Trusted Third Parties in Disaster Recovery -- Gartner Research


Contribute your Thoughts:

0/2000 characters
Edmond
14 hours ago
Agreed, C is crucial for trust in recovery plans!
upvoted 0 times
...
Janet
6 days ago
Wait, does a third party really help with authentication? Sounds risky.
upvoted 0 times
...
Melissa
11 days ago
I think D is important too, but C covers it better.
upvoted 0 times
...
Clorinda
16 days ago
C is definitely the right answer!
upvoted 0 times
...
Kirk
21 days ago
A) Monitors enclosures? Nah, I need my keys to be authenticated, not my closets!
upvoted 0 times
...
Hui
26 days ago
C) Provides authentication and authorization. Trusted third parties are the way to go.
upvoted 0 times
...
Natalie
1 month ago
B) Protects against encrypted attacks. Gotta keep those hackers out, am I right?
upvoted 0 times
...
Reta
1 month ago
I vaguely recall that trusted third parties are crucial for authorization, so C could be the right choice here.
upvoted 0 times
...
Raymon
1 month ago
I feel like the answer might be about protecting against attacks, but that doesn't seem to fit with the question about correlations.
upvoted 0 times
...
Gracia
2 months ago
I remember a practice question about third parties and user verification, and I think it was related to option C.
upvoted 0 times
...
Ciara
2 months ago
This seems straightforward to me. The trusted third party provides authentication and authorization services, which is crucial for disaster recovery when you need to verify user identities and access. I'm confident C is the right answer here.
upvoted 0 times
...
Ora
2 months ago
Okay, I've got this. The advantage is that a trusted third party can confirm the correlation between users and their public keys. This helps protect against attacks and ensures the integrity of the recovery process. I'm going with C.
upvoted 0 times
...
Derick
2 months ago
D) Features full-time monitoring. Gotta keep an eye on things 24/7 in a crisis.
upvoted 0 times
...
Nan
2 months ago
I think using a trusted third party helps with authentication, but I'm not entirely sure if that's the main advantage.
upvoted 0 times
...
Rana
2 months ago
C) Provides authentication and authorization. That's the key to disaster recovery planning.
upvoted 0 times
...
Valentin
3 months ago
I'm a bit confused by the wording of the question. Is it asking about the advantages of using a third party, or specifically in the context of disaster recovery planning? I'll need to think this through carefully.
upvoted 0 times
...
Reid
3 months ago
Hmm, I think this is asking about the benefits of using a third-party service to verify user identities and public keys. Option C seems like the best answer - it provides authentication and authorization, which is important for disaster recovery.
upvoted 0 times
...
Kanisha
3 months ago
I'm not sure I fully understand the question. Can someone clarify what a "trusted third party" is in this context?
upvoted 0 times
Glenn
3 months ago
I think option C makes the most sense then!
upvoted 0 times
...
...

Save Cancel