WGU C836 Fundamentals of Information Security 2023/ 2024 Update Final Exam | Questions and Verified Answers| Grade A

WGU C836 Fundamentals of Information Security 2023/ 2024 Update Final Exam | Questions and Verified Answers| Grade A

WGU C836 Fundamentals of Information
Security 2023/ 2024 Update Final Exam |
Questions and Verified Answers| Grade A
QUESTION
The process of intelligence gathering and analysis to support business decisions is known as
.
A. Competitive intelligence
B. Competitive business
C. Business intelligence
D. Business competition
E. Counter intelligence
Answer:
A. Competitive intelligence
QUESTION
The study that was conducted to discover the cause of the information leak during the Vietnam
War was codenamed _
and is now considered a symbol of OPSEC.
A. Sun Tzu
B. Vietnam Viper
C. The Art of War
D. Purple Dragon
Answer:
D. Purple Dragon
QUESTION
The process of intelligence gathering and analysis in order to support business decisions
Answer:
Competitive intelligence

QUESTION
Name the five steps of the operations security process

  1. Identification of critical information
  2. Analysis of threats
  3. Analysis of vulnerabilities
  4. Assessment of risks
  5. Application of countermeasures
    Answer:
  6. Identification of critical information
  7. Analysis of threats
  8. Analysis of vulnerabilities
  9. Assessment of risks
  10. Application of countermeasures
    QUESTION
    Haas’ Laws of Operations Security: The First Law
    Answer:
    If you don’t know the threat, how do you know what to protect?
    QUESTION
    Haas’ Laws of Operations Security: The Second Law
    Answer:
    If you don’t know what to protect, how do you know you are protecting it?
    QUESTION
    Haas’ Laws of Operations Security: The Third Law
    Answer:
    If you are not protecting it, the dragon wins!

QUESTION
The first step in the OPSEC process, and arguably the most important: to identify the assets that
most need protection and will cause us the most harm if exposed
Answer:
Identification of critical information
QUESTION
The second step in the OPSEC process: to look at the potential harm or financial impact that
might be caused by critical information being exposed, and who might exploit that exposure
Answer:
Analysis of threats
QUESTION
The third step in the OPSEC process: to look at the weaknesses that can be used to harm us
Answer:
Analysis of vulnerabilities
QUESTION
The fourth step in the OPSEC process: to determine what issues we really need to be concerned
about (areas with matching threats and vulnerabilities)
Answer:
Assessment of risks
QUESTION
The fifth step in the OPSEC process: to put measures in place to mitigate risks

Answer:
Application of countermeasures
QUESTION
Name the most common security awareness issues
Protecting data, passwords, social engineering, network usage, malware, the use of personal
equipment, clean desk, policy knowledge
Answer:
Name the most common security awareness issues
Protecting data, passwords, social engineering, network usage, malware, the use of personal
equipment, clean desk, policy knowledge
QUESTION
A technique used by an attacker that relies on the willingness of people to help others
Answer:
Social engineering
QUESTION
A technique involving a fake identity and a believable scenario that elicits the target to give out
sensitive information or perform some action which they would not normally do for a stranger
Answer:
Pretexting
QUESTION
A social engineering technique that uses electronic communications (email, texts, or phone calls)
to convince a potential victim to give out sensitive information or perform some action
Answer:
Phishing
Powered by https://learnexams.com/search/study?query=

Scroll to Top