WGU C836 Fundamentals of Information Security Exam | Complete Guide Questions and Verified Answers| 2023/ 2024 Update
Q: Dynamic Analysis
Answer:
Involves testing the application while it’s in operation. Testing the compiled binary form or the
running web application.
Resembles real attacks against the application
Q: Physical Penetration Testing
Answer:
Involves directly testing physical security mea- sures such as picking locks or bypassing alarm
security system
Q: Hardware Penetration Testing
Answer:
Occurs in organizations that manufacture hard- ware devices, such as network gear, TVs, or IoT
devices
Q: network segmentation
WGU C836 Fundamentals of Information
Security Exam | Complete Guide Questions
and Verified Answers| 2023/ 2024 Update
Answer:
The act of dividing a network into multiple smaller networks, each acting as its own small
network (subnet)
Q: choke points
Answer:
certain points in the network, such as routers, firewalls, or prox- ies, where we can inspect, filter,
and control network traffic
Q: redundancy
Answer:
a method of security that involves designing a network to always have another route if
something fails or loses connection
Q: firewall
Answer:
a mechanism for maintaining control over the traffic that flows into and out of our networks.
Create network segmentation when installed.
Q: packet filtering
Answer:
A firewall technology that inspects the contents of each packet in traffic individually and makes
a gross determination (based on source and desti- nation IP address, port number, and the
protocol being used) of whether the traffic should be allowed to pass
Q: SPI (Stateful Packet Inspection)
Answer:
Uses what is called a state table to keep track of the connection and will only allow traffic that is
part of or already established connection.
Also function as packet filtering firewall, combining the two forms of filtering
Q: DPI (Deep Packet Inspection)
Answer:
a firewall technology that can analyze the actual content of the traffic that is flowing through
Reassemble the content of the traffic to look at what will be delivered to he applica- tion for
which is destined
Q: proxy server
Answer:
a specialized type of firewall that can serve as a choke point, in order to allow us to filter traffic
for attacks or undesirable content such as malware or traffic to Web sites hosting adult content
Q: DMZ (demilitarized zone)
Answer:
a combination of a network design feature and a protective device such as a firewall.
Often used for systems that need to be exposed to external networks but are connected to our
own network (such as a web server)
Q: NIDS (Network intrusion detection system)
Answer:
A system that monitors network traffic and alerts for unauthorized activity
Q: Anomaly-based
Answer:
an IDS typically work by taking a baseline of the normal traffic and activity taking place on the
network
It can actually stand up against zero day attacks (have no signature)
Q: signature-based
Answer:
An IDS that maintains a database of signatures that might signal a particular type of attack and
compares incoming traffic to those signatures. Works in a very similar fashion to most antivirus
system.
Q: VPN (Virtual Private Network)
Powered by https://learnexams.com/search/study?query=