{"id":118991,"date":"2023-09-08T17:19:09","date_gmt":"2023-09-08T17:19:09","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=118991"},"modified":"2023-09-08T17:19:10","modified_gmt":"2023-09-08T17:19:10","slug":"wgu-c836-object-assessment-pre-assessment-final-exams-fundamentals-of-information-security-100-correct-questions-and-verified-answers-all-2023-2024-updates-study-bundle-with-complete-solutio","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/08\/wgu-c836-object-assessment-pre-assessment-final-exams-fundamentals-of-information-security-100-correct-questions-and-verified-answers-all-2023-2024-updates-study-bundle-with-complete-solutio\/","title":{"rendered":"WGU C836 Object Assessment\/ Pre- Assessment\/ Final Exams : Fundamentals of Information Security | 100% Correct| Questions and Verified Answers| ALL 2023\/ 2024 UPDATES STUDY BUNDLE WITH COMPLETE SOLUTIONS"},"content":{"rendered":"\n<p>Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, each<br>employee must provide a valid user name and password, and then answer one of six security<br>questions accurately.&#8221;<br>Which type of security does the policy address?<br>Answer:<br>Operations<br>Q: An organization notices unauthorized visitors following employees through a restricted<br>doorway.<br>Which vulnerability should be addressed in the organization&#8217;s security policy?<br>Answer:<br>Tailgating<br>Q: A company wants to update its access control policy. The company wants to prevent hourly<br>employees from logging in to company computers after business hours.<br>Which type of access control policy should be implemented?<br>Answer:<br>Attribute-based<br>WGU C836 Pre- Assessment Fundamentals<br>of Information Security Exam Version 1|<br>Questions and Verified Answers| 2023\/ 2024<br>Update<\/p>\n\n\n\n<p>Q: A new software development company has determined that one of its proprietary algorithms<br>is at a high risk for unauthorized disclosure. The company&#8217;s security up to this point has been<br>fairly lax.<br>Which procedure should the company implement to protect this asset?<br>Answer:<br>Relocate the algorithm to encrypted storage<br>Q: An accounting firm stores financial data for many customers. The company policy requires<br>that employees only access data for customers they are assigned to. The company implements a<br>written policy indicating an employee can be fired for violating this requirement.<br>Which type of control has the company implemented?<br>Answer:<br>Preventive<br>Q: How can an operating system be hardened in accordance to the principle of least privilege?<br>Answer:<br>Restrict account permissions<br>Q: A company implements an Internet-facing web server for its sales force to review product<br>information. The sales force can also update its profiles and profile photos, but not the product<br>information. There is no other information on this server.<br>Which content access permissions should be granted to the sales force based on the principle of<br>least privilege?<br>Answer:<br>Read and limited write access<\/p>\n\n\n\n<p>Q: A corporation has discovered that some confidential personnel information has been used<br>inappropriately.<br>How can the principle of least privilege be applied to limit access to confidential personnel<br>records?<br>Answer:<br>Only allow access to those who need access to perform their job<br>Q: A user runs an application that has been infected with malware that is less than 24 hours old.<br>The malware then infects the operating system.<br>Which safeguard should be implemented to prevent this type of attack?<br>Answer:<br>Limit user account privileges<br>Q: A company was the victim of a security breach resulting in stolen user credentials. An<br>attacker used a stolen username and password to login to an employee email account.<br>Which security practice could have reduced the post-breach impact of this event?<br>Answer:<br>Multifactor authentication<br>Q: A module in a security awareness course shows a user making use of two-factor<br>authentication using a hardware token.<br>Which security failure is being addressed by this training module?<br>Answer:<br>Weak passwords<\/p>\n\n\n\n<p>Q: An organization employs a VPN to safeguard its information. Which security principle is<br>protected by a VPN?<br>Answer:<br>Data in motion<br>Q: A malicious hacker was successful in a denial of service (DoS) attack against an institution&#8217;s<br>mail server. Fortunately, no data was lost or altered while the server was offline. Which type of<br>attack is this?<br>Answer:<br>Interruption<br>Q: A company has had several successful denial of service (DoS) attacks on its email server.<br>Which security principle is being attacked?<br>Answer:<br>Availability<br>Q: Which file action implements the principle of confidentiality from the CIA triad?<br>Answer:<br>Encryption<br>WGU C836 Pre- Assessment Fundamentals<br>of Information Security Exam Version 2|<br>Questions and Verified Answers| 2023\/ 2024<br>Update<\/p>\n\n\n\n<p>Q: A company&#8217;s IT policy manual states that &#8220;All company computers, workstations,<br>application servers, and mobile devices must have current versions of antivirus software.&#8221; Which<br>principle or concept of cybersecurity does this policy statement impact?<br>Answer:<br>Operating system security<br>Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, each<br>employee must provide a valid user name and password, and then answer one of six security<br>questions accurately.&#8221;Which type of security does the policy address?<br>Answer:<br>Operations<br>Q: A company wants to update its access control policy. The company wants to prevent hourly<br>employees from logging in to company computers after business hours. Which type of access<br>control policy should be implemented?<br>Answer:<br>Attribute-based<br>Q: A user runs an application that has been infected with malware that is less than 24 hours old.<br>The malware then infects the operating system. Which safeguard should be implemented to<br>prevent this type of attack?<br>Answer:<br>Limit user account privileges.<br>Q: Which type of tool can be used to detect vulnerabilities in source code related to improper<br>handling of user input?<\/p>\n\n\n\n<p>Answer:<br>Fuzzer<br>Q: Which tool should an application developer use to help identify input validation<br>vulnerabilities?<br>Answer:<br>A fuzzer<br>Q: A company has files stored on a server that are critical to the organization&#8217;s viability. The<br>administrator has assigned the appropriate permissions to the files. How should the administrator<br>provide additional confidentiality protection for the files at rest?<br>Answer:<br>File encryption<br>Q: An attacker performs a buffer overflow attack on an organization&#8217;s web server. The web<br>server locks up and must be restarted to restore functionality. Which part of the CIA triad is<br>under attack?<br>Answer:<br>Availability<br>Q: Some malware hides itself by replacing some system administrator commands on a server,<br>but the server continues to function normally for its users. Which component of the CIA triad has<br>been compromised?<br>Answer:<br>Integrity<br>Q: Which two principles of the CIA triad can be violated by a fabrication attack?<\/p>\n\n\n\n<p>Q: What process ensures compliance with applicable laws, policies, and other bodies of<br>administrative control, and detects misuse? This task contains the radio buttons and checkboxes<br>for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Nonrepudiation<br>B. Deterrence<br>C. Auditing<br>D. Accountability<br>E. Authorization<br>Answer:<br>C. Auditing<br>Lesson: Auditing and Accountability<br>Objective: Introduction<br>Q: Nessus is an example of a(n) <strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> tool. This task contains the radio buttons<br>and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Fuzzing<br>B. Anti-virus<br>C. Anti-malware<br>D. Vulnerability scanning<br>E. Penetration testing<br>Answer:<br>D. Vulnerability scanning<br>Q: A surveillance video log contains a record, including the exact date and time, of an<br>individual gaining access to his company&#8217;s office building after hours. He denies that he was<br>there during that time, but the existence of the video log proves otherwise. What benefit of<br>WGU C836 Fundamentals of Information<br>Security Final Exam | Questions and Verified<br>Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>accountability does this example demonstrate? This task contains the radio buttons and<br>checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.<br>A. Deterrence<br>B. Nonrepudiation<br>C. Intrusion detection and prevention<br>D. Authentication<br>E. Authorization<br>Answer:<br>B. Nonrepudiation<br>Q: <strong><em>_<\/em><\/strong> provides us with the means to trace activities in our environment back to their<br>source. This task contains the radio buttons and checkboxes for options. The shortcut keys to<br>perform this task are A to H and alt+1 to alt+9.<br>A. Access<br>B. Authentication<br>C. Accountability<br>D. Authorization<br>E. Nonrepudiation<br>Answer:<br>C. Accountability<br>Q: Backordered Parts is a defense contractor that builds communications parts for the military.<br>The employees use mostly Web-based applications for parts design and information sharing. Due<br>to the sensitive nature of the business, Backordered Parts would like to implement a solution that<br>secures all browser connections to the Web servers. What encryption solution best meets this<br>company&#8217;s needs? This task contains the radio buttons and checkboxes for options.<br>A. Elliptic Curve Cryptography (ECC)<br>B. Digital signatures<br>C. Advanced Encryption Standard (AES)<br>D. Blowfish<br>Answer:<br>A. Elliptic Curve Cryptography (ECC)<\/p>\n\n\n\n<p>Lesson: Cryptography<br>Objective: Alert!<br>Q: Question 3 : We are somewhat limited in our ability to protect which type of data? This task<br>contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are<br>A to H and alt+1 to alt+9.<br>A. Data at rest<br>B. Data in motion<br>C. Data in use<br>Answer:<br>C. Data in use<br>Q: he science of breaking through encryption is known as <strong>_<\/strong>. This task contains the radio<br>buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1<br>to alt+9.<br>A. Ciphertext<br>B. Cryptology<br>C. Cryptography<br>D. Cryptanalysis<br>Answer:<br>D. Cryptanalysis<br>Q: The specifics of the process used to encrypt the plaintext or decrypt the ciphertext<br>Answer:<br>Cryptographic algorithm<br>Q: Also known as private key cryptography, this uses a single key for both encryption of the<br>plaintext and decryption of the ciphertext<\/p>\n\n\n\n<p>Answer:<br>Symmetric key cryptography<br>Example: AES<br>Q: A type of cipher that takes a predetermined number of bits in the plaintext message<br>(commonly 64 bits) and encrypts that block<br>Answer:<br>Block cipher<br>Q: A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time<br>Answer:<br>Stream cipher<br>Q: A set of symmetric block ciphers endorsed by the US government through NIST. Shares the<br>same block modes that DES uses and also includes other modes such as XEX-based Tweaked<br>CodeBook (TCB) mode<br>Answer:<br>AES<br>Q: Also known as public key cryptography, this method uses two keys: a public key and a<br>private key.<br>Answer:<br>Asymmetric key cryptography<br>Q: Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic<\/p>\n\n\n\n<p>Q: Employees are required to swipe their access cards and then to use an iris scanner to access<br>protected areas in the company&#8217;s data center.<br>Which two authentication techniques are used to protect the data center?<br>A Something you have and something you are<br>B Something you know and something you do<br>C Something you do and something you are<br>D Something you have and something you know<br>Answer:<br>A<br>Q: A health company must comply with HIPAA regulations. It decides to encrypt databases<br>that contain HIPAA information.<br>Which resource is the health company directly trying to protect?<br>A Operating system<br>B Server<br>C Data<br>D Application<br>Answer:<br>C<br>Q: A file is stored in a marketing folder and is accessible only to members of the marketing<br>group. An attacker uses a phishing scam to gain the credentials of a user who is a member of the<br>marketing group, and then reads the file.<br>Which leg of the CIA triad is being targeted?<br>WGU C836 Fundamentals of Information<br>Security Final Exam | Questions and Verified<br>Answers| Grade A| New 2023\/ 2024 Update<\/p>\n\n\n\n<p>A Control<br>B Integrity<br>C Availability<br>D Confidentiality<br>Answer:<br>D<br>Q: An attacker performs a buffer overflow attack on an organization&#8217;s web server. The web<br>server locks up and must be restarted to restore functionality.<br>Which part of the CIA triad is under attack?<br>A Confidentiality<br>B Integrity<br>C Control<br>D Availability<br>Answer:<br>D<br>Q: Some malware hides itself by replacing some system administrator commands on a server,<br>but the server continues to function normally for its users.<br>Which component of the CIA triad has been compromised?<br>A Confidentiality<br>B Integrity<br>B Availability<br>D Authenticity<br>Answer:<br>B<br>Q: Which component of the CIA triad will be impacted if an attacker cuts network cables?<\/p>\n\n\n\n<p>A Availability<br>B Confidentiality<br>C Authenticity<br>D Integrity<br>Answer:<br>A<br>Q: A bank wants to ensure user interactions with the online banking website are confidential.<br>Which security solution should be implemented?<br>A SSH\/FTP<br>B AES<br>C SSL\/TLS<br>D VPN<br>Answer:<br>C<br>Q: What is an example of symmetric key encryption?<br>A MD5<br>B RSA<br>C AES<br>D ECC<br>Answer:<br>C<br>Q: Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?<br>A AES<br>B MD5<br>C RSA<\/p>\n\n\n\n<p>D 3DES<br>Answer:<br>C<br>Q: A company has just completed an audit of disaster protection strategies. The company has<br>decided it must keep and be able to retrieve backup data for a period of 30 years. The company<br>has implemented tape backups using 8mm digital audio tapes.<br>Which factor could impact the company&#8217;s ability to access information from the backup tapes?<br>A Tape access speed<br>B Technical obsolescence<br>C Reading tape header<br>D Network speed<br>Answer:<br>B<br>Q: A military installation is evaluating backup solutions for its critical data. This installation<br>operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.<br>Which physical media should be selected to ensure the integrity of backups is preserved given<br>these harsh operating conditions?<br>A Optical media<br>B Flash drives<br>C Tape media<br>D Hard drives<br>Answer:<br>B<br>Q: A university research group wants to collect data on animals that are native to southern<br>Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the edge of a<br>national park and to use optical media to backup photos and research notes.<\/p>\n\n\n\n<p>Update<br>Q: What is a risk?<br>Answer:<br>the likelihood that something bad will happen from a threat exploiting a vulnerability<br>Q: What in an impact?<br>Answer:<br>The value of the assets being threatened<br>Q: Physical Controls<br>Answer:<br>Locks, fences, doors, and guards are examples of<br>Q: Technical Controls<br>Answer:<br>Firewalls, IPS, IDS, and Anti-Virus are examples of<br>Q: Administrative Controls<br>WGU C836 Object Assessment Fundamentals<br>of Information Security Exam| 100% Correct|<br>Questions and Verified Answers| 2023\/ 2024<\/p>\n\n\n\n<p>Answer:<br>Acceptable Use Policies and Email Policies are examples of<br>Q: Symmetric Crypography<br>Answer:<br>uses a single key for encrypting and decrypting<br>Q: Asymmetric Cryptography<br>Answer:<br>uses two keys for encrypting and decrypting<br>Q: Hash Function<br>Answer:<br>keyless, but uses a fixed length string of letters and numbers<br>Q: Digital Signatures<br>Answer:<br>shows message was sent by user, works directly with nonrepudiation<br>Q: Certificates (CA)<br>Answer:<br>links a public key to an individual and used as a form of electronic identification.<\/p>\n\n\n\n<p>Q: Block Cypher<br>Answer:<br>Encryption of an entire block<br>Q: Stream Cypher<br>Answer:<br>Encryption of one bit at a time<br>Q: DES<br>Answer:<br>56 bit key block cypher<br>Q: 3DES<br>Answer:<br>Encryption of a block 3 times over<br>Q: AES<br>Answer:<br>Replaced DES, uses 3 different cyphers within a 128-bit, 192-bit, and 256-bit keys.<br>Q: RSA<\/p>\n\n\n\n<p>Q: Dynamic Analysis<br>Answer:<br>Involves testing the application while it&#8217;s in operation. Testing the compiled binary form or the<br>running web application.<br>Resembles real attacks against the application<br>Q: Physical Penetration Testing<br>Answer:<br>Involves directly testing physical security mea- sures such as picking locks or bypassing alarm<br>security system<br>Q: Hardware Penetration Testing<br>Answer:<br>Occurs in organizations that manufacture hard- ware devices, such as network gear, TVs, or IoT<br>devices<br>Q: network segmentation<br>WGU C836 Fundamentals of Information<br>Security Exam | Complete Guide Questions<br>and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Answer:<br>The act of dividing a network into multiple smaller networks, each acting as its own small<br>network (subnet)<br>Q: choke points<br>Answer:<br>certain points in the network, such as routers, firewalls, or prox- ies, where we can inspect, filter,<br>and control network traffic<br>Q: redundancy<br>Answer:<br>a method of security that involves designing a network to always have another route if<br>something fails or loses connection<br>Q: firewall<br>Answer:<br>a mechanism for maintaining control over the traffic that flows into and out of our networks.<br>Create network segmentation when installed.<br>Q: packet filtering<br>Answer:<\/p>\n\n\n\n<p>A firewall technology that inspects the contents of each packet in traffic individually and makes<br>a gross determination (based on source and desti- nation IP address, port number, and the<br>protocol being used) of whether the traffic should be allowed to pass<br>Q: SPI (Stateful Packet Inspection)<br>Answer:<br>Uses what is called a state table to keep track of the connection and will only allow traffic that is<br>part of or already established connection.<br>Also function as packet filtering firewall, combining the two forms of filtering<br>Q: DPI (Deep Packet Inspection)<br>Answer:<br>a firewall technology that can analyze the actual content of the traffic that is flowing through<br>Reassemble the content of the traffic to look at what will be delivered to he applica- tion for<br>which is destined<br>Q: proxy server<br>Answer:<br>a specialized type of firewall that can serve as a choke point, in order to allow us to filter traffic<br>for attacks or undesirable content such as malware or traffic to Web sites hosting adult content<br>Q: DMZ (demilitarized zone)<\/p>\n\n\n\n<p>Answer:<br>a combination of a network design feature and a protective device such as a firewall.<br>Often used for systems that need to be exposed to external networks but are connected to our<br>own network (such as a web server)<br>Q: NIDS (Network intrusion detection system)<br>Answer:<br>A system that monitors network traffic and alerts for unauthorized activity<br>Q: Anomaly-based<br>Answer:<br>an IDS typically work by taking a baseline of the normal traffic and activity taking place on the<br>network<br>It can actually stand up against zero day attacks (have no signature)<br>Q: signature-based<br>Answer:<br>An IDS that maintains a database of signatures that might signal a particular type of attack and<br>compares incoming traffic to those signatures. Works in a very similar fashion to most antivirus<br>system.<br>Q: VPN (Virtual Private Network)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, eachemployee must provide a valid user name and password, and then answer one of six securityquestions accurately.&#8221;Which type of security does the policy address?Answer:OperationsQ: An organization notices unauthorized visitors following employees through a restricteddoorway.Which vulnerability should be addressed in the organization&#8217;s [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-118991","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/118991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=118991"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/118991\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=118991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=118991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=118991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}