WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| Grade A| New 2023/ 2024 Update
Q: Employees are required to swipe their access cards and then to use an iris scanner to access
protected areas in the company’s data center.
Which two authentication techniques are used to protect the data center?
A Something you have and something you are
B Something you know and something you do
C Something you do and something you are
D Something you have and something you know
Answer:
A
Q: A health company must comply with HIPAA regulations. It decides to encrypt databases
that contain HIPAA information.
Which resource is the health company directly trying to protect?
A Operating system
B Server
C Data
D Application
Answer:
C
Q: A file is stored in a marketing folder and is accessible only to members of the marketing
group. An attacker uses a phishing scam to gain the credentials of a user who is a member of the
marketing group, and then reads the file.
Which leg of the CIA triad is being targeted?
WGU C836 Fundamentals of Information
Security Final Exam | Questions and Verified
Answers| Grade A| New 2023/ 2024 Update
A Control
B Integrity
C Availability
D Confidentiality
Answer:
D
Q: An attacker performs a buffer overflow attack on an organization’s web server. The web
server locks up and must be restarted to restore functionality.
Which part of the CIA triad is under attack?
A Confidentiality
B Integrity
C Control
D Availability
Answer:
D
Q: Some malware hides itself by replacing some system administrator commands on a server,
but the server continues to function normally for its users.
Which component of the CIA triad has been compromised?
A Confidentiality
B Integrity
B Availability
D Authenticity
Answer:
B
Q: Which component of the CIA triad will be impacted if an attacker cuts network cables?
A Availability
B Confidentiality
C Authenticity
D Integrity
Answer:
A
Q: A bank wants to ensure user interactions with the online banking website are confidential.
Which security solution should be implemented?
A SSH/FTP
B AES
C SSL/TLS
D VPN
Answer:
C
Q: What is an example of symmetric key encryption?
A MD5
B RSA
C AES
D ECC
Answer:
C
Q: Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?
A AES
B MD5
C RSA
D 3DES
Answer:
C
Q: A company has just completed an audit of disaster protection strategies. The company has
decided it must keep and be able to retrieve backup data for a period of 30 years. The company
has implemented tape backups using 8mm digital audio tapes.
Which factor could impact the company’s ability to access information from the backup tapes?
A Tape access speed
B Technical obsolescence
C Reading tape header
D Network speed
Answer:
B
Q: A military installation is evaluating backup solutions for its critical data. This installation
operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.
Which physical media should be selected to ensure the integrity of backups is preserved given
these harsh operating conditions?
A Optical media
B Flash drives
C Tape media
D Hard drives
Answer:
B
Q: A university research group wants to collect data on animals that are native to southern
Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the edge of a
national park and to use optical media to backup photos and research notes.
Powered by https://learnexams.com/search/study?query=