W836 Pre- Assessment Fundamentals of Information Security Exam V2| Questions and Verified Answers| Grade A| 2023/ 2024 Update (70 Q&A)

W836 Pre- Assessment Fundamentals of Information Security Exam V2| Questions and Verified Answers| Grade A| 2023/ 2024 Update (70 Q&A)

W836 Pre- Assessment Fundamentals of
Information Security Exam V2| Questions
and Verified Answers| Grade A| 2023/ 2024
Update (70 Q&A)
QUESTION
A company has just completed an audit of disaster protection strategies. The company has
decided it must keep and be able to retrieve backup data for a period of 30 years. The company
has implemented tape backups using 8mm digital audio tapes. Which factor could impact the
company’s ability to access information from the backup tapes?
Answer:
technology obsolescence
QUESTION
A military installation is evaluating backup solutions for its critical data. This installation
operates in a harsh environment that is subjected to heat, humidity, and magnetic fields. Which
physical media should be selected to ensure the integrity of backups is preserved given these
harsh operating conditions?
Answer:
Flash
QUESTION
A university research group wants to collect data on animals that are native to southern Arizona,
which is a hot, dry region. They plan to camp in tents for the summer at the edge of a national
park and to use optical media to backup photos and research notes. Which physical or
environmental factor may damage their optical media?
Answer:
Temperature

QUESTION
While visiting a country in the European Union, an American purchases an expensive bottle of
perfume with a credit card. What does the European Union Directive 95/46/EC regulation
safeguard for the purchaser?
Answer:
Personally identifiable information
QUESTION
Which U.S. law defines security standards exclusively for federal agencies?
Answer:
FISMA
QUESTION
Which U.S. law regulates the confidentiality and accuracy of a publicly traded corporation’s
financial reports?
Answer:
SOX
QUESTION
Which tool can be used to map devices on a network, along with their operating system types
and versions?
Answer:
Port scanner
QUESTION
Which web attack is a server-side attack?

Answer:
SQL Injection
QUESTION
A company has had several successful denial of service (DoS) attacks on its email server.
Which security principle is being attacked?
Answer:
Availability
QUESTION
Which web attack is possible due to a lack of input validation?
Answer:
SQL Injection
QUESTION
Which file action implements the principle of confidentiality from the CIA triad?
Answer:
Encryption
QUESTION
An organization plans to encrypt data in transit on a network.
Which aspect of data is the organization attempting to protect?
Answer:
Integrity
Powered by https://learnexams.com/search/study?query=

Scroll to Top