WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| 2023/ 2024 Update

WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| 2023/ 2024 Update

Q: What process ensures compliance with applicable laws, policies, and other bodies of
administrative control, and detects misuse? This task contains the radio buttons and checkboxes
for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Nonrepudiation
B. Deterrence
C. Auditing
D. Accountability
E. Authorization
Answer:
C. Auditing
Lesson: Auditing and Accountability
Objective: Introduction
Q: Nessus is an example of a(n) ___ tool. This task contains the radio buttons
and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Fuzzing
B. Anti-virus
C. Anti-malware
D. Vulnerability scanning
E. Penetration testing
Answer:
D. Vulnerability scanning
Q: A surveillance video log contains a record, including the exact date and time, of an
individual gaining access to his company’s office building after hours. He denies that he was
there during that time, but the existence of the video log proves otherwise. What benefit of
WGU C836 Fundamentals of Information
Security Final Exam | Questions and Verified
Answers| 2023/ 2024 Update

accountability does this example demonstrate? This task contains the radio buttons and
checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A. Deterrence
B. Nonrepudiation
C. Intrusion detection and prevention
D. Authentication
E. Authorization
Answer:
B. Nonrepudiation
Q: _ provides us with the means to trace activities in our environment back to their
source. This task contains the radio buttons and checkboxes for options. The shortcut keys to
perform this task are A to H and alt+1 to alt+9.
A. Access
B. Authentication
C. Accountability
D. Authorization
E. Nonrepudiation
Answer:
C. Accountability
Q: Backordered Parts is a defense contractor that builds communications parts for the military.
The employees use mostly Web-based applications for parts design and information sharing. Due
to the sensitive nature of the business, Backordered Parts would like to implement a solution that
secures all browser connections to the Web servers. What encryption solution best meets this
company’s needs? This task contains the radio buttons and checkboxes for options.
A. Elliptic Curve Cryptography (ECC)
B. Digital signatures
C. Advanced Encryption Standard (AES)
D. Blowfish
Answer:
A. Elliptic Curve Cryptography (ECC)

Lesson: Cryptography
Objective: Alert!
Q: Question 3 : We are somewhat limited in our ability to protect which type of data? This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are
A to H and alt+1 to alt+9.
A. Data at rest
B. Data in motion
C. Data in use
Answer:
C. Data in use
Q: he science of breaking through encryption is known as _. This task contains the radio
buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1
to alt+9.
A. Ciphertext
B. Cryptology
C. Cryptography
D. Cryptanalysis
Answer:
D. Cryptanalysis
Q: The specifics of the process used to encrypt the plaintext or decrypt the ciphertext
Answer:
Cryptographic algorithm
Q: Also known as private key cryptography, this uses a single key for both encryption of the
plaintext and decryption of the ciphertext

Answer:
Symmetric key cryptography
Example: AES
Q: A type of cipher that takes a predetermined number of bits in the plaintext message
(commonly 64 bits) and encrypts that block
Answer:
Block cipher
Q: A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time
Answer:
Stream cipher
Q: A set of symmetric block ciphers endorsed by the US government through NIST. Shares the
same block modes that DES uses and also includes other modes such as XEX-based Tweaked
CodeBook (TCB) mode
Answer:
AES
Q: Also known as public key cryptography, this method uses two keys: a public key and a
private key.
Answer:
Asymmetric key cryptography
Q: Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic
Powered by https://learnexams.com/search/study?query=

Scroll to Top