Q: A company’s website policy states that “To gain access to the corporate website, each
employee must provide a valid user name and password, and then answer one of six security
questions accurately.”
Which type of security does the policy address?
Answer:
Operations
Q: An organization notices unauthorized visitors following employees through a restricted
doorway.
Which vulnerability should be addressed in the organization’s security policy?
Answer:
Tailgating
Q: A company wants to update its access control policy. The company wants to prevent hourly
employees from logging in to company computers after business hours.
Which type of access control policy should be implemented?
Answer:
Attribute-based
WGU C836 Pre- Assessment Fundamentals
of Information Security Exam Version 1|
Questions and Verified Answers| 2023/ 2024
Update
Q: A new software development company has determined that one of its proprietary algorithms
is at a high risk for unauthorized disclosure. The company’s security up to this point has been
fairly lax.
Which procedure should the company implement to protect this asset?
Answer:
Relocate the algorithm to encrypted storage
Q: An accounting firm stores financial data for many customers. The company policy requires
that employees only access data for customers they are assigned to. The company implements a
written policy indicating an employee can be fired for violating this requirement.
Which type of control has the company implemented?
Answer:
Preventive
Q: How can an operating system be hardened in accordance to the principle of least privilege?
Answer:
Restrict account permissions
Q: A company implements an Internet-facing web server for its sales force to review product
information. The sales force can also update its profiles and profile photos, but not the product
information. There is no other information on this server.
Which content access permissions should be granted to the sales force based on the principle of
least privilege?
Answer:
Read and limited write access
Q: A corporation has discovered that some confidential personnel information has been used
inappropriately.
How can the principle of least privilege be applied to limit access to confidential personnel
records?
Answer:
Only allow access to those who need access to perform their job
Q: A user runs an application that has been infected with malware that is less than 24 hours old.
The malware then infects the operating system.
Which safeguard should be implemented to prevent this type of attack?
Answer:
Limit user account privileges
Q: A company was the victim of a security breach resulting in stolen user credentials. An
attacker used a stolen username and password to login to an employee email account.
Which security practice could have reduced the post-breach impact of this event?
Answer:
Multifactor authentication
Q: A module in a security awareness course shows a user making use of two-factor
authentication using a hardware token.
Which security failure is being addressed by this training module?
Answer:
Weak passwords
Q: An organization employs a VPN to safeguard its information. Which security principle is
protected by a VPN?
Answer:
Data in motion
Q: A malicious hacker was successful in a denial of service (DoS) attack against an institution’s
mail server. Fortunately, no data was lost or altered while the server was offline. Which type of
attack is this?
Answer:
Interruption
Q: A company has had several successful denial of service (DoS) attacks on its email server.
Which security principle is being attacked?
Answer:
Availability
Q: Which file action implements the principle of confidentiality from the CIA triad?
Answer:
Encryption
WGU C836 Pre- Assessment Fundamentals
of Information Security Exam Version 2|
Questions and Verified Answers| 2023/ 2024
Update
Q: A company’s IT policy manual states that “All company computers, workstations,
application servers, and mobile devices must have current versions of antivirus software.” Which
principle or concept of cybersecurity does this policy statement impact?
Answer:
Operating system security
Q: A company’s website policy states that “To gain access to the corporate website, each
employee must provide a valid user name and password, and then answer one of six security
questions accurately.”Which type of security does the policy address?
Answer:
Operations
Q: A company wants to update its access control policy. The company wants to prevent hourly
employees from logging in to company computers after business hours. Which type of access
control policy should be implemented?
Answer:
Attribute-based
Q: A user runs an application that has been infected with malware that is less than 24 hours old.
The malware then infects the operating system. Which safeguard should be implemented to
prevent this type of attack?
Answer:
Limit user account privileges.
Q: Which type of tool can be used to detect vulnerabilities in source code related to improper
handling of user input?
Answer:
Fuzzer
Q: Which tool should an application developer use to help identify input validation
vulnerabilities?
Answer:
A fuzzer
Q: A company has files stored on a server that are critical to the organization’s viability. The
administrator has assigned the appropriate permissions to the files. How should the administrator
provide additional confidentiality protection for the files at rest?
Answer:
File encryption
Q: An attacker performs a buffer overflow attack on an organization’s web server. The web
server locks up and must be restarted to restore functionality. Which part of the CIA triad is
under attack?
Answer:
Availability
Q: Some malware hides itself by replacing some system administrator commands on a server,
but the server continues to function normally for its users. Which component of the CIA triad has
been compromised?
Answer:
Integrity
Q: Which two principles of the CIA triad can be violated by a fabrication attack?
Q: What process ensures compliance with applicable laws, policies, and other bodies of
administrative control, and detects misuse? This task contains the radio buttons and checkboxes
for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Nonrepudiation
B. Deterrence
C. Auditing
D. Accountability
E. Authorization
Answer:
C. Auditing
Lesson: Auditing and Accountability
Objective: Introduction
Q: Nessus is an example of a(n) ___ tool. This task contains the radio buttons
and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Fuzzing
B. Anti-virus
C. Anti-malware
D. Vulnerability scanning
E. Penetration testing
Answer:
D. Vulnerability scanning
Q: A surveillance video log contains a record, including the exact date and time, of an
individual gaining access to his company’s office building after hours. He denies that he was
there during that time, but the existence of the video log proves otherwise. What benefit of
WGU C836 Fundamentals of Information
Security Final Exam | Questions and Verified
Answers| 2023/ 2024 Update
accountability does this example demonstrate? This task contains the radio buttons and
checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Deterrence
B. Nonrepudiation
C. Intrusion detection and prevention
D. Authentication
E. Authorization
Answer:
B. Nonrepudiation
Q: _ provides us with the means to trace activities in our environment back to their
source. This task contains the radio buttons and checkboxes for options. The shortcut keys to
perform this task are A to H and alt+1 to alt+9.
A. Access
B. Authentication
C. Accountability
D. Authorization
E. Nonrepudiation
Answer:
C. Accountability
Q: Backordered Parts is a defense contractor that builds communications parts for the military.
The employees use mostly Web-based applications for parts design and information sharing. Due
to the sensitive nature of the business, Backordered Parts would like to implement a solution that
secures all browser connections to the Web servers. What encryption solution best meets this
company’s needs? This task contains the radio buttons and checkboxes for options.
A. Elliptic Curve Cryptography (ECC)
B. Digital signatures
C. Advanced Encryption Standard (AES)
D. Blowfish
Answer:
A. Elliptic Curve Cryptography (ECC)
Lesson: Cryptography
Objective: Alert!
Q: Question 3 : We are somewhat limited in our ability to protect which type of data? This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are
A to H and alt+1 to alt+9.
A. Data at rest
B. Data in motion
C. Data in use
Answer:
C. Data in use
Q: he science of breaking through encryption is known as _. This task contains the radio
buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1
to alt+9.
A. Ciphertext
B. Cryptology
C. Cryptography
D. Cryptanalysis
Answer:
D. Cryptanalysis
Q: The specifics of the process used to encrypt the plaintext or decrypt the ciphertext
Answer:
Cryptographic algorithm
Q: Also known as private key cryptography, this uses a single key for both encryption of the
plaintext and decryption of the ciphertext
Answer:
Symmetric key cryptography
Example: AES
Q: A type of cipher that takes a predetermined number of bits in the plaintext message
(commonly 64 bits) and encrypts that block
Answer:
Block cipher
Q: A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time
Answer:
Stream cipher
Q: A set of symmetric block ciphers endorsed by the US government through NIST. Shares the
same block modes that DES uses and also includes other modes such as XEX-based Tweaked
CodeBook (TCB) mode
Answer:
AES
Q: Also known as public key cryptography, this method uses two keys: a public key and a
private key.
Answer:
Asymmetric key cryptography
Q: Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic
Q: Employees are required to swipe their access cards and then to use an iris scanner to access
protected areas in the company’s data center.
Which two authentication techniques are used to protect the data center?
A Something you have and something you are
B Something you know and something you do
C Something you do and something you are
D Something you have and something you know
Answer:
A
Q: A health company must comply with HIPAA regulations. It decides to encrypt databases
that contain HIPAA information.
Which resource is the health company directly trying to protect?
A Operating system
B Server
C Data
D Application
Answer:
C
Q: A file is stored in a marketing folder and is accessible only to members of the marketing
group. An attacker uses a phishing scam to gain the credentials of a user who is a member of the
marketing group, and then reads the file.
Which leg of the CIA triad is being targeted?
WGU C836 Fundamentals of Information
Security Final Exam | Questions and Verified
Answers| Grade A| New 2023/ 2024 Update
A Control
B Integrity
C Availability
D Confidentiality
Answer:
D
Q: An attacker performs a buffer overflow attack on an organization’s web server. The web
server locks up and must be restarted to restore functionality.
Which part of the CIA triad is under attack?
A Confidentiality
B Integrity
C Control
D Availability
Answer:
D
Q: Some malware hides itself by replacing some system administrator commands on a server,
but the server continues to function normally for its users.
Which component of the CIA triad has been compromised?
A Confidentiality
B Integrity
B Availability
D Authenticity
Answer:
B
Q: Which component of the CIA triad will be impacted if an attacker cuts network cables?
A Availability
B Confidentiality
C Authenticity
D Integrity
Answer:
A
Q: A bank wants to ensure user interactions with the online banking website are confidential.
Which security solution should be implemented?
A SSH/FTP
B AES
C SSL/TLS
D VPN
Answer:
C
Q: What is an example of symmetric key encryption?
A MD5
B RSA
C AES
D ECC
Answer:
C
Q: Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?
A AES
B MD5
C RSA
D 3DES
Answer:
C
Q: A company has just completed an audit of disaster protection strategies. The company has
decided it must keep and be able to retrieve backup data for a period of 30 years. The company
has implemented tape backups using 8mm digital audio tapes.
Which factor could impact the company’s ability to access information from the backup tapes?
A Tape access speed
B Technical obsolescence
C Reading tape header
D Network speed
Answer:
B
Q: A military installation is evaluating backup solutions for its critical data. This installation
operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.
Which physical media should be selected to ensure the integrity of backups is preserved given
these harsh operating conditions?
A Optical media
B Flash drives
C Tape media
D Hard drives
Answer:
B
Q: A university research group wants to collect data on animals that are native to southern
Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the edge of a
national park and to use optical media to backup photos and research notes.
Update
Q: What is a risk?
Answer:
the likelihood that something bad will happen from a threat exploiting a vulnerability
Q: What in an impact?
Answer:
The value of the assets being threatened
Q: Physical Controls
Answer:
Locks, fences, doors, and guards are examples of
Q: Technical Controls
Answer:
Firewalls, IPS, IDS, and Anti-Virus are examples of
Q: Administrative Controls
WGU C836 Object Assessment Fundamentals
of Information Security Exam| 100% Correct|
Questions and Verified Answers| 2023/ 2024
Answer:
Acceptable Use Policies and Email Policies are examples of
Q: Symmetric Crypography
Answer:
uses a single key for encrypting and decrypting
Q: Asymmetric Cryptography
Answer:
uses two keys for encrypting and decrypting
Q: Hash Function
Answer:
keyless, but uses a fixed length string of letters and numbers
Q: Digital Signatures
Answer:
shows message was sent by user, works directly with nonrepudiation
Q: Certificates (CA)
Answer:
links a public key to an individual and used as a form of electronic identification.
Q: Block Cypher
Answer:
Encryption of an entire block
Q: Stream Cypher
Answer:
Encryption of one bit at a time
Q: DES
Answer:
56 bit key block cypher
Q: 3DES
Answer:
Encryption of a block 3 times over
Q: AES
Answer:
Replaced DES, uses 3 different cyphers within a 128-bit, 192-bit, and 256-bit keys.
Q: RSA
Q: Dynamic Analysis
Answer:
Involves testing the application while it’s in operation. Testing the compiled binary form or the
running web application.
Resembles real attacks against the application
Q: Physical Penetration Testing
Answer:
Involves directly testing physical security mea- sures such as picking locks or bypassing alarm
security system
Q: Hardware Penetration Testing
Answer:
Occurs in organizations that manufacture hard- ware devices, such as network gear, TVs, or IoT
devices
Q: network segmentation
WGU C836 Fundamentals of Information
Security Exam | Complete Guide Questions
and Verified Answers| 2023/ 2024 Update
Answer:
The act of dividing a network into multiple smaller networks, each acting as its own small
network (subnet)
Q: choke points
Answer:
certain points in the network, such as routers, firewalls, or prox- ies, where we can inspect, filter,
and control network traffic
Q: redundancy
Answer:
a method of security that involves designing a network to always have another route if
something fails or loses connection
Q: firewall
Answer:
a mechanism for maintaining control over the traffic that flows into and out of our networks.
Create network segmentation when installed.
Q: packet filtering
Answer:
A firewall technology that inspects the contents of each packet in traffic individually and makes
a gross determination (based on source and desti- nation IP address, port number, and the
protocol being used) of whether the traffic should be allowed to pass
Q: SPI (Stateful Packet Inspection)
Answer:
Uses what is called a state table to keep track of the connection and will only allow traffic that is
part of or already established connection.
Also function as packet filtering firewall, combining the two forms of filtering
Q: DPI (Deep Packet Inspection)
Answer:
a firewall technology that can analyze the actual content of the traffic that is flowing through
Reassemble the content of the traffic to look at what will be delivered to he applica- tion for
which is destined
Q: proxy server
Answer:
a specialized type of firewall that can serve as a choke point, in order to allow us to filter traffic
for attacks or undesirable content such as malware or traffic to Web sites hosting adult content
Q: DMZ (demilitarized zone)
Answer:
a combination of a network design feature and a protective device such as a firewall.
Often used for systems that need to be exposed to external networks but are connected to our
own network (such as a web server)
Q: NIDS (Network intrusion detection system)
Answer:
A system that monitors network traffic and alerts for unauthorized activity
Q: Anomaly-based
Answer:
an IDS typically work by taking a baseline of the normal traffic and activity taking place on the
network
It can actually stand up against zero day attacks (have no signature)
Q: signature-based
Answer:
An IDS that maintains a database of signatures that might signal a particular type of attack and
compares incoming traffic to those signatures. Works in a very similar fashion to most antivirus
system.
Q: VPN (Virtual Private Network)