{"id":127582,"date":"2023-11-26T21:39:09","date_gmt":"2023-11-26T21:39:09","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127582"},"modified":"2023-11-26T21:39:10","modified_gmt":"2023-11-26T21:39:10","slug":"wgu-c836-fundamentals-of-information-security-final-exam-questions-and-verified-answers-grade-a-new-2023-2024-update","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-fundamentals-of-information-security-final-exam-questions-and-verified-answers-grade-a-new-2023-2024-update\/","title":{"rendered":"WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| Grade A| New 2023\/ 2024 Update"},"content":{"rendered":"\n<p>WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| Grade A| New 2023\/ 2024 Update<\/p>\n\n\n\n<p>Q: Employees are required to swipe their access cards and then to use an iris scanner to access<br>protected areas in the company&#8217;s data center.<br>Which two authentication techniques are used to protect the data center?<br>A Something you have and something you are<br>B Something you know and something you do<br>C Something you do and something you are<br>D Something you have and something you know<br>Answer:<br>A<br>Q: A health company must comply with HIPAA regulations. It decides to encrypt databases<br>that contain HIPAA information.<br>Which resource is the health company directly trying to protect?<br>A Operating system<br>B Server<br>C Data<br>D Application<br>Answer:<br>C<br>Q: A file is stored in a marketing folder and is accessible only to members of the marketing<br>group. An attacker uses a phishing scam to gain the credentials of a user who is a member of the<br>marketing group, and then reads the file.<br>Which leg of the CIA triad is being targeted?<br>WGU C836 Fundamentals of Information<br>Security Final Exam | Questions and Verified<br>Answers| Grade A| New 2023\/ 2024 Update<\/p>\n\n\n\n<p>A Control<br>B Integrity<br>C Availability<br>D Confidentiality<br>Answer:<br>D<br>Q: An attacker performs a buffer overflow attack on an organization&#8217;s web server. The web<br>server locks up and must be restarted to restore functionality.<br>Which part of the CIA triad is under attack?<br>A Confidentiality<br>B Integrity<br>C Control<br>D Availability<br>Answer:<br>D<br>Q: Some malware hides itself by replacing some system administrator commands on a server,<br>but the server continues to function normally for its users.<br>Which component of the CIA triad has been compromised?<br>A Confidentiality<br>B Integrity<br>B Availability<br>D Authenticity<br>Answer:<br>B<br>Q: Which component of the CIA triad will be impacted if an attacker cuts network cables?<\/p>\n\n\n\n<p>A Availability<br>B Confidentiality<br>C Authenticity<br>D Integrity<br>Answer:<br>A<br>Q: A bank wants to ensure user interactions with the online banking website are confidential.<br>Which security solution should be implemented?<br>A SSH\/FTP<br>B AES<br>C SSL\/TLS<br>D VPN<br>Answer:<br>C<br>Q: What is an example of symmetric key encryption?<br>A MD5<br>B RSA<br>C AES<br>D ECC<br>Answer:<br>C<br>Q: Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?<br>A AES<br>B MD5<br>C RSA<\/p>\n\n\n\n<p>D 3DES<br>Answer:<br>C<br>Q: A company has just completed an audit of disaster protection strategies. The company has<br>decided it must keep and be able to retrieve backup data for a period of 30 years. The company<br>has implemented tape backups using 8mm digital audio tapes.<br>Which factor could impact the company&#8217;s ability to access information from the backup tapes?<br>A Tape access speed<br>B Technical obsolescence<br>C Reading tape header<br>D Network speed<br>Answer:<br>B<br>Q: A military installation is evaluating backup solutions for its critical data. This installation<br>operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.<br>Which physical media should be selected to ensure the integrity of backups is preserved given<br>these harsh operating conditions?<br>A Optical media<br>B Flash drives<br>C Tape media<br>D Hard drives<br>Answer:<br>B<br>Q: A university research group wants to collect data on animals that are native to southern<br>Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the edge of a<br>national park and to use optical media to backup photos and research notes.<br>Powered by<a href=\" https:\/\/learnexams.com\/search\/study?query=\"> https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A-NEW-2023-2024-UPDATE.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A-NEW-2023-2024-UPDATE.\"><\/object><a id=\"wp-block-file--media-c8276c09-63cb-4913-938d-41826c2566cf\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A-NEW-2023-2024-UPDATE.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A-NEW-2023-2024-UPDATE<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A-NEW-2023-2024-UPDATE.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-c8276c09-63cb-4913-938d-41826c2566cf\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Fundamentals of Information Security Final Exam | Questions and Verified Answers| Grade A| New 2023\/ 2024 Update Q: Employees are required to swipe their access cards and then to use an iris scanner to accessprotected areas in the company&#8217;s data center.Which two authentication techniques are used to protect the data center?A Something you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127582","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127582"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127582\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}