{"id":127576,"date":"2023-11-26T21:32:55","date_gmt":"2023-11-26T21:32:55","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127576"},"modified":"2023-11-26T21:32:57","modified_gmt":"2023-11-26T21:32:57","slug":"wgu-c836-pre-assessment-fundamentals-of-information-security-exam-version-2-questions-and-verified-answers-2023-2024-update","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-pre-assessment-fundamentals-of-information-security-exam-version-2-questions-and-verified-answers-2023-2024-update\/","title":{"rendered":"WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 2| Questions and Verified Answers| 2023\/ 2024 Update"},"content":{"rendered":"\n<p>WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 2| Questions and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Q: An organization employs a VPN to safeguard its information. Which security principle is<br>protected by a VPN?<br>Answer:<br>Data in motion<br>Q: A malicious hacker was successful in a denial of service (DoS) attack against an institution&#8217;s<br>mail server. Fortunately, no data was lost or altered while the server was offline. Which type of<br>attack is this?<br>Answer:<br>Interruption<br>Q: A company has had several successful denial of service (DoS) attacks on its email server.<br>Which security principle is being attacked?<br>Answer:<br>Availability<br>Q: Which file action implements the principle of confidentiality from the CIA triad?<br>Answer:<br>Encryption<br>WGU C836 Pre- Assessment Fundamentals<br>of Information Security Exam Version 2|<br>Questions and Verified Answers| 2023\/ 2024<br>Update<\/p>\n\n\n\n<p>Q: A company&#8217;s IT policy manual states that &#8220;All company computers, workstations,<br>application servers, and mobile devices must have current versions of antivirus software.&#8221; Which<br>principle or concept of cybersecurity does this policy statement impact?<br>Answer:<br>Operating system security<br>Q: A company&#8217;s website policy states that &#8220;To gain access to the corporate website, each<br>employee must provide a valid user name and password, and then answer one of six security<br>questions accurately.&#8221;Which type of security does the policy address?<br>Answer:<br>Operations<br>Q: A company wants to update its access control policy. The company wants to prevent hourly<br>employees from logging in to company computers after business hours. Which type of access<br>control policy should be implemented?<br>Answer:<br>Attribute-based<br>Q: A user runs an application that has been infected with malware that is less than 24 hours old.<br>The malware then infects the operating system. Which safeguard should be implemented to<br>prevent this type of attack?<br>Answer:<br>Limit user account privileges.<br>Q: Which type of tool can be used to detect vulnerabilities in source code related to improper<br>handling of user input?<\/p>\n\n\n\n<p>Answer:<br>Fuzzer<br>Q: Which tool should an application developer use to help identify input validation<br>vulnerabilities?<br>Answer:<br>A fuzzer<br>Q: A company has files stored on a server that are critical to the organization&#8217;s viability. The<br>administrator has assigned the appropriate permissions to the files. How should the administrator<br>provide additional confidentiality protection for the files at rest?<br>Answer:<br>File encryption<br>Q: An attacker performs a buffer overflow attack on an organization&#8217;s web server. The web<br>server locks up and must be restarted to restore functionality. Which part of the CIA triad is<br>under attack?<br>Answer:<br>Availability<br>Q: Some malware hides itself by replacing some system administrator commands on a server,<br>but the server continues to function normally for its users. Which component of the CIA triad has<br>been compromised?<br>Answer:<br>Integrity<br>Q: Which two principles of the CIA triad can be violated by a fabrication attack?<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-2-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-2-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.\"><\/object><a id=\"wp-block-file--media-425f0cb3-e351-4059-8387-dde15501914b\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-2-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-2-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-PRE-ASSESSMENT-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-VERSION-2-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-425f0cb3-e351-4059-8387-dde15501914b\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Pre- Assessment Fundamentals of Information Security Exam Version 2| Questions and Verified Answers| 2023\/ 2024 Update Q: An organization employs a VPN to safeguard its information. Which security principle isprotected by a VPN?Answer:Data in motionQ: A malicious hacker was successful in a denial of service (DoS) attack against an institution&#8217;smail server. Fortunately, no [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127576","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127576"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127576\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}