{"id":127573,"date":"2023-11-26T21:31:36","date_gmt":"2023-11-26T21:31:36","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127573"},"modified":"2023-11-26T21:31:37","modified_gmt":"2023-11-26T21:31:37","slug":"wgu-c836-pre-assessment-fundamentals-of-information-security-exam-version-1-questions-and-verified-answers-2023-2024-update","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-pre-assessment-fundamentals-of-information-security-exam-version-1-questions-and-verified-answers-2023-2024-update\/","title":{"rendered":"WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 1| Questions and Verified Answers| 2023\/ 2024 Update"},"content":{"rendered":"\n<p>WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 1| Questions and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, each<br>employee must provide a valid user name and password, and then answer one of six security<br>questions accurately.&#8221;<br>Which type of security does the policy address?<br>Answer:<br>Operations<br>Q: An organization notices unauthorized visitors following employees through a restricted<br>doorway.<br>Which vulnerability should be addressed in the organization&#8217;s security policy?<br>Answer:<br>Tailgating<br>Q: A company wants to update its access control policy. The company wants to prevent hourly<br>employees from logging in to company computers after business hours.<br>Which type of access control policy should be implemented?<br>Answer:<br>Attribute-based<br>WGU C836 Pre- Assessment Fundamentals<br>of Information Security Exam Version 1|<br>Questions and Verified Answers| 2023\/ 2024<br>Update<\/p>\n\n\n\n<p>Q: A new software development company has determined that one of its proprietary algorithms<br>is at a high risk for unauthorized disclosure. The company&#8217;s security up to this point has been<br>fairly lax.<br>Which procedure should the company implement to protect this asset?<br>Answer:<br>Relocate the algorithm to encrypted storage<br>Q: An accounting firm stores financial data for many customers. The company policy requires<br>that employees only access data for customers they are assigned to. The company implements a<br>written policy indicating an employee can be fired for violating this requirement.<br>Which type of control has the company implemented?<br>Answer:<br>Preventive<br>Q: How can an operating system be hardened in accordance to the principle of least privilege?<br>Answer:<br>Restrict account permissions<br>Q: A company implements an Internet-facing web server for its sales force to review product<br>information. The sales force can also update its profiles and profile photos, but not the product<br>information. There is no other information on this server.<br>Which content access permissions should be granted to the sales force based on the principle of<br>least privilege?<br>Answer:<br>Read and limited write access<\/p>\n\n\n\n<p>Q: A corporation has discovered that some confidential personnel information has been used<br>inappropriately.<br>How can the principle of least privilege be applied to limit access to confidential personnel<br>records?<br>Answer:<br>Only allow access to those who need access to perform their job<br>Q: A user runs an application that has been infected with malware that is less than 24 hours old.<br>The malware then infects the operating system.<br>Which safeguard should be implemented to prevent this type of attack?<br>Answer:<br>Limit user account privileges<br>Q: A company was the victim of a security breach resulting in stolen user credentials. An<br>attacker used a stolen username and password to login to an employee email account.<br>Which security practice could have reduced the post-breach impact of this event?<br>Answer:<br>Multifactor authentication<br>Q: A module in a security awareness course shows a user making use of two-factor<br>authentication using a hardware token.<br>Which security failure is being addressed by this training module?<br>Answer:<br>Weak passwords<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-1-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-1-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.\"><\/object><a id=\"wp-block-file--media-75d28ebe-50bb-4d2a-9bf5-d1204fb19d4f\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-1-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-1-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-1-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-75d28ebe-50bb-4d2a-9bf5-d1204fb19d4f\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 1| Questions and Verified Answers| 2023\/ 2024 Update Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, eachemployee must provide a valid user name and password, and then answer one of six securityquestions accurately.&#8221;Which type of security does the policy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127573","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127573"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127573\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}