{"id":125948,"date":"2023-11-24T04:37:15","date_gmt":"2023-11-24T04:37:15","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=125948"},"modified":"2023-11-24T04:37:17","modified_gmt":"2023-11-24T04:37:17","slug":"wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-2024","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/24\/wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-2024\/","title":{"rendered":"WGU C836 &#8211; FUNDAMENTALS OF INFORMATION SECURITY OA LATEST EXAM 2023-2024"},"content":{"rendered":"\n<p>Which aspect of the CIA triad is violated by an unauthorized database<br>roll back or undo?<br>Integrity<br>A company&#8217;s website has suffered several denial of service (DoS)<br>attacks and wishes to thwart future attacks. Which security principle is<br>the company addressing?<br>Availability<br>An organization has a requirement that all database servers and file<br>servers be configured to maintain operations in the presence of a failure.<br>Which principle of the CIA triad is this requirement implementing?<br>Availability<br>Which tool can be used to map devices on a network, along with their<br>operating system types and versions?<br>Port scanner<br>Which web attack is a server-side attack?<br>SQL injection<br>A new start-up company has started working on a social networking<br>website. The company has moved all its source code to a cloud provider<br>and wants to protect this source code from unauthorized access. Which<br><br>cyber defense concept should the start-up company use to maintain the<br>confidentiality of its source code?<br>File encryption<br>A company has an annual audit of installed software and data storage<br>systems. During the audit, the auditor asks how the company&#8217;s most<br>critical data is used. This determination helps the auditor ensure that the<br>proper defense mechanisms are in place to protect critical data. Which<br>principle of the Parkerian hexad is the auditor addressing?<br>Utility<br>Which web attack is possible due to a lack of input validation?<br>SQL injection<br>Which cybersecurity term is defined as the potential for an attack on a<br>resource?<br>Threat<br>Which security type deliberately exposes a system&#8217;s vulnerabilities or<br>resources to an attacker?<br>Honeypots<br>An organization employs a VPN to safeguard its information. Which<br>security principle is protected by a VPN?<br>Data in Motion<br>A malicious hacker was successful in a denial of service (DoS) attack<br>against an institution&#8217;s mail server. Fortunately, no data was lost or<br>altered while the server was offline. Which type of attack is this?<br>Interruption<br>A company has had several successful denial of service (DoS) attacks on<br>its email server. Which security principle is being attacked?<br><br>Availability<br>Which file action implements the principle of confidentiality from the<br>CIA triad?<br>Encryption<br>Which cyber defense concept suggests limiting permissions to only what<br>is necessary to perform a particular task?<br>Principle of least privilege<br>Confidentiality<br>A company institutes a new policy that &#8220;All office computer monitors<br>must face toward employees and must face away from doorways. The<br>monitor screens must not be visible to people visiting the office.&#8221; Which<br>principle of the CIA triad is this company applying?<br>Operating System Security<br>A company&#8217;s IT policy manual states that &#8220;All company computers,<br>workstations, application servers, and mobile devices must have current<br>versions of antivirus software.&#8221; Which principle or concept of<br>cybersecurity does this policy statement impact?<br>An organization&#8217;s procedures document states that &#8220;All electronic<br>communications should be encrypted during transmission across<br>networks using encryption standards specified in the data encryption<br>policy.&#8221; Which security principle is this policy addressing?<br>Confidentiality<br>A company&#8217;s website policy states that &#8220;To gain access to the corporate<br>website, each employee must provide a valid user name and password,<br>and then answer one of six security questions accurately.&#8221;Which type of<br>security does the policy address?<br>Operations<br><br>An organization notices unauthorized visitors following employees<br>through a restricted doorway. Which vulnerability should be addressed<br>in the organization&#8217;s security policy?<br>Tailgating<br>A company wants to update its access control policy. The company<br>wants to prevent hourly employees from logging in to company<br>computers after business hours. Which type of access control policy<br>should be implemented?<br>Attribute-based<br>A new software development company has determined that one of its<br>proprietary algorithms is at a high risk for unauthorized disclosure. The<br>company&#8217;s security up to this point has been fairly lax. Which procedure<br>should the company implement to protect this asset?<br>Relocate the algorithm to encrypted storage.<br>An accounting firm stores financial data for many customers. The<br>company policy requires that employees only access data for customers<br>they are assigned to. The company implements a written policy<br>indicating an employee can be fired for violating this requirement.<br>Which type of control has the company implemented?<br>Deterrent<br>How can an operating system be hardened in accordance to the principle<br>of least privilege?<br>Restrict account permissions.<br>A company implements an Internet-facing web server for its sales force<br>to review product information. The sales force can also update its<br>profiles and profile photos, but not the product information. There is no<br>other information on this server. Which content access permissions<\/p>\n\n\n\n<p>Download full pdf here <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Which aspect of the CIA triad is violated by an unauthorized databaseroll back or undo?IntegrityA company&#8217;s website has suffered several denial of service (DoS)attacks and wishes to thwart future attacks. Which security principle isthe company addressing?AvailabilityAn organization has a requirement that all database servers and fileservers be configured to maintain operations in the presence of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-125948","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/125948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=125948"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/125948\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=125948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=125948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=125948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}