WGU C836 Fundamentals of Information Security 2023/ 2024 Update Final Exam | Questions and Verified Answers| Grade A
WGU C836 Fundamentals of Information
Security 2023/ 2024 Update Final Exam |
Questions and Verified Answers| Grade A
QUESTION
The process of intelligence gathering and analysis to support business decisions is known as
.
A. Competitive intelligence
B. Competitive business
C. Business intelligence
D. Business competition
E. Counter intelligence
Answer:
A. Competitive intelligence
QUESTION
The study that was conducted to discover the cause of the information leak during the Vietnam
War was codenamed _ and is now considered a symbol of OPSEC.
A. Sun Tzu
B. Vietnam Viper
C. The Art of War
D. Purple Dragon
Answer:
D. Purple Dragon
QUESTION
The process of intelligence gathering and analysis in order to support business decisions
Answer:
Competitive intelligence
QUESTION
Name the five steps of the operations security process
- Identification of critical information
- Analysis of threats
- Analysis of vulnerabilities
- Assessment of risks
- Application of countermeasures
Answer: - Identification of critical information
- Analysis of threats
- Analysis of vulnerabilities
- Assessment of risks
- Application of countermeasures
QUESTION
Haas’ Laws of Operations Security: The First Law
Answer:
If you don’t know the threat, how do you know what to protect?
QUESTION
Haas’ Laws of Operations Security: The Second Law
Answer:
If you don’t know what to protect, how do you know you are protecting it?
QUESTION
Haas’ Laws of Operations Security: The Third Law
Answer:
If you are not protecting it, the dragon wins!
QUESTION
The first step in the OPSEC process, and arguably the most important: to identify the assets that
most need protection and will cause us the most harm if exposed
Answer:
Identification of critical information
QUESTION
The second step in the OPSEC process: to look at the potential harm or financial impact that
might be caused by critical information being exposed, and who might exploit that exposure
Answer:
Analysis of threats
QUESTION
The third step in the OPSEC process: to look at the weaknesses that can be used to harm us
Answer:
Analysis of vulnerabilities
QUESTION
The fourth step in the OPSEC process: to determine what issues we really need to be concerned
about (areas with matching threats and vulnerabilities)
Answer:
Assessment of risks
QUESTION
The fifth step in the OPSEC process: to put measures in place to mitigate risks
Answer:
Application of countermeasures
QUESTION
Name the most common security awareness issues
Protecting data, passwords, social engineering, network usage, malware, the use of personal
equipment, clean desk, policy knowledge
Answer:
Name the most common security awareness issues
Protecting data, passwords, social engineering, network usage, malware, the use of personal
equipment, clean desk, policy knowledge
QUESTION
A technique used by an attacker that relies on the willingness of people to help others
Answer:
Social engineering
QUESTION
A technique involving a fake identity and a believable scenario that elicits the target to give out
sensitive information or perform some action which they would not normally do for a stranger
Answer:
Pretexting
QUESTION
A social engineering technique that uses electronic communications (email, texts, or phone calls)
to convince a potential victim to give out sensitive information or perform some action
Answer:
Phishing
Powered by https://learnexams.com/search/study?query=