{"id":116631,"date":"2023-08-25T16:50:31","date_gmt":"2023-08-25T16:50:31","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=116631"},"modified":"2023-08-25T16:50:33","modified_gmt":"2023-08-25T16:50:33","slug":"wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-questions-and-verified-correct-answers-a-grade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/25\/wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-questions-and-verified-correct-answers-a-grade\/","title":{"rendered":"WGU C836 FUNDAMENTALS OF INFORMATION SECURITY OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT ANSWERS A+ GRADE"},"content":{"rendered":"\n<p>WGU C836 FUNDAMENTALS OF INFORMATION SECURITY<br>OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT<br>ANSWERS A+ GRADE<br>Which cybersecurity term is defined as the potential for an attack on a resource?<br>A Impact<br>B Vulnerability<br>C Risk<br>D Threat<br>Which security type deliberately exposes a system&#8217;s vulnerabilities or resources to an attacker?<br>A Intrusion detection<br>B Firewalls<br>C Honeypots<br>D Intrusion prevention<br>Which tool can be used to map devices on a network, along with their operating system types<br>and versions?<br>A Packet sniffer<br>B Packet filter<br>C Port scanner<br>D Stateful firewall<br>Which web attack is a server-side attack?<br>A Clickjacking<br>B Cross-site scripting<br>C SQL injection<br>D Cross-site request forgery<br>An organization employs a VPN to safeguard its information.<br>Which security principle is protected by a VPN?<br>A Data in motion<br>B Data at rest<br>C Data in use<br>D Data in storage<br>A malicious hacker was successful in a denial of service (DoS) attack against an institution&#8217;s<br>mail server. Fortunately, no data was lost or altered while the server was offline.<br>Which type of attack is this?<\/p>\n\n\n\n<p>WGU C836 FUNDAMENTALS OF INFORMATION SECURITY<br>OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT<br>ANSWERS A+ GRADE<br>A Modification<br>B Fabrication<br>C Interception<br>D Interruption<br>A company has had several successful denial of service (DoS) attacks on its email server.<br>Which security principle is being attacked?<br>A Possession<br>B Integrity<br>C Confidentiality<br>D Availability<br>A new start-up company has started working on a social networking website. The company has<br>moved all its source code to a cloud provider and wants to protect this source code from<br>unauthorized access.<br>Which cyber defense concept should the start-up company use to maintain the confidentiality of<br>its source code?<br>A Alarm systems<br>B Account permissions<br>C Antivirus software<br>D File encryption<br>A company has an annual audit of installed software and data storage systems. During the audit,<br>the auditor asks how the company&#8217;s most critical data is used. This determination helps the<br>auditor ensure that the proper defense mechanisms are in place to protect critical data.<br>Which principle of the Parkerian hexad is the auditor addressing?<br>A Possession<br>B Integrity<br>C Authenticity<br>D Utility<br>Which web attack is possible due to a lack of input validation?<br>A Extraneous files<br>B Clickjacking<br>C SQL injection<br>D Cross-site request forgery<br>Which file action implements the principle of confidentiality from the CIA triad?<\/p>\n\n\n\n<p>WGU C836 FUNDAMENTALS OF INFORMATION SECURITY<br>OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT<br>ANSWERS A+ GRADE<br>A Compression<br>B Hash<br>C Backup<br>D Encryption<br>Which cyber defense concept suggests limiting permissions to only what is necessary to perform<br>a particular task?<br>A Authentication<br>B Authorization<br>C Defense in depth<br>D Principle of least privilege<br>A company institutes a new policy that &#8220;All office computer monitors must face toward<br>employees and must face away from doorways. The monitor screens must not be visible to<br>people visiting the office.&#8221;<br>Which principle of the CIA triad is this company applying?<br>A Availability<br>B Confidentiality<br>C Utility<br>D Integrity<br>At a small company, an employee makes an unauthorized data alteration.<br>Which component of the CIA triad has been compromised?<br>A Confidentiality<br>B Authenticity<br>C Integrity<br>D Availability<br>An organization plans to encrypt data in transit on a network.<br>Which aspect of data is the organization attempting to protect?<br>A Integrity<br>B Possession<br>C Availability<br>D Authenticity<br>Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?<br>A Availability<br>B Identification<\/p>\n\n\n\n<p>WGU C836 FUNDAMENTALS OF INFORMATION SECURITY<br>OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT<br>ANSWERS A+ GRADE<br>C Integrity<br>D Confidentiality<br>A company&#8217;s website has suffered several denial of service (DoS) attacks and wishes to thwart<br>future attacks.<br>Which security principle is the company addressing?<br>A Availability<br>B Authenticity<br>C Confidentiality<br>D Possession<br>An organization has a requirement that all database servers and file servers be configured to<br>maintain operations in the presence of a failure.<br>Which principle of the CIA triad is this requirement implementing?<br>A Utility<br>B Integrity<br>C Availability<br>D Confidentiality<br>A company&#8217;s IT policy manual states that &#8220;All company computers, workstations, application<br>servers, and mobile devices must have current versions of antivirus software.&#8221;<br>Which principle or concept of cybersecurity does this policy statement impact?<br>A Accounting policy<br>B Operating system security<br>C Access control policy<br>D Physical security<br>An organization&#8217;s procedures document states that &#8220;All electronic communications should be<br>encrypted during transmission across networks using encryption standards specified in the data<br>encryption policy.&#8221;<br>Which security principle is this policy addressing?<br>A Interruption<br>B Confidentiality<br>C Control<br>D Availability<br>A company&#8217;s website policy states that &#8220;To gain access to the corporate website, each employee<br>must provide a valid user name and password, and then answer one of six security questions<\/p>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 FUNDAMENTALS OF INFORMATION SECURITYOA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECTANSWERS A+ GRADEWhich cybersecurity term is defined as the potential for an attack on a resource?A ImpactB VulnerabilityC RiskD ThreatWhich security type deliberately exposes a system&#8217;s vulnerabilities or resources to an attacker?A Intrusion detectionB FirewallsC HoneypotsD Intrusion preventionWhich tool can be used to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-116631","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/116631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=116631"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/116631\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=116631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=116631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=116631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}