WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| Grade A| Newly Updated 2023/ 2024
WGU C836 Fundamentals of Information
Security Final Exam | Questions and Verified
Answers| Grade A| Newly Updated 2023/
2024
QUESTION
After considerable research, attackers directed a spear phishing attack at employees at a single
bank. One employee opened a message, resulting in a breach that delivered ransomware.
Which type of control should be implemented to prevent future spear phishing attacks?
A Mutual authentication
B Strong passwords
C Employee training
D Input validation
Answer:
C
QUESTION
A company has instituted a policy to prevent data leakage. The policy requires that any data
stored on USB storage devices must be encrypted with at least 256-bit encryption.
Which principle that is part of the Parkerian hexad but not the CIA triad would be violated if one
of these devices was stolen?
A Confidentiality
B Integrity
C Possession
D Authenticity
Answer:
C
QUESTION
A company is concerned about potential phishing attacks through email. As a result, a new
company policy dictates that all email must be digitally signed before it is sent to any customers
or partners.
Which security principle that is part of Parkerian hexad but not part of the CIA triad is
precipitating this policy change?
A Confidentiality
B Authenticity
C Control
D Utility
Answer:
B
QUESTION
Which two principles of the CIA triad can be violated by a fabrication attack?
A Integrity and authenticity
B Integrity and availability
C Confidentiality and integrity
D Confidentiality and availability
Answer:
B
QUESTION
Which two principles of the CIA triad can be violated by an interruption attack?
A Confidentiality and availability
B Confidentiality and integrity
C Integrity and availability
D Integrity and authenticity
Answer:
C
QUESTION
Which attack category targets the confidentiality of data?
A Interruption
B Modification
C Interception
D Fabrication
Answer:
C
QUESTION
A bank website accepts online loan applications. It requires applicants to review and sign a
disclosure document explaining the organization’s information sharing practices.
Which federal law protects consumer’s financial information?
A SOX
B GLBA
C FERPA
D HIPAA
Answer:
B
QUESTION
A retail store has hired a third party to audit its computer and network systems that process credit
card payments.
Which industry standard is the retail store addressing?
A FERPA
B HIPAA
C SOX
D PCI DSS
Answer:
D
QUESTION
In order to continue processing credit card payments, a retail store arranges for an external
auditor to perform regular external and internal vulnerability scans.
Which regulation are they addressing?
A GLBA
B PCI DSS
C FCRA
D HIPAA
Answer:
B
QUESTION
A hospital allows its patients to pay by credit card.
Which set of regulations apply to the hospital’s operations?
A HIPAA and FCRA
B FERPA and PCI DSS
C HIPAA and PCI DSS
D FERPA and HITECH
Answer:
C
QUESTION
While visiting a country in the European Union, an American purchases an expensive bottle of
perfume with a credit card.
What does the European Union Directive 95/46/EC regulation safeguard for the purchaser?
A Personally identifiable information
Powered by https://learnexams.com/search/study?query=