{"id":127588,"date":"2023-11-26T21:44:35","date_gmt":"2023-11-26T21:44:35","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127588"},"modified":"2023-11-26T21:44:36","modified_gmt":"2023-11-26T21:44:36","slug":"wgu-c836-fundamentals-of-information-security-exam-complete-guide-questions-and-verified-answers-2023-2024-update","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-fundamentals-of-information-security-exam-complete-guide-questions-and-verified-answers-2023-2024-update\/","title":{"rendered":"WGU C836 Fundamentals of Information Security Exam | Complete Guide Questions and Verified Answers| 2023\/ 2024 Update"},"content":{"rendered":"\n<p>WGU C836 Fundamentals of Information Security Exam | Complete Guide Questions and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Q: Dynamic Analysis<br>Answer:<br>Involves testing the application while it&#8217;s in operation. Testing the compiled binary form or the<br>running web application.<br>Resembles real attacks against the application<br>Q: Physical Penetration Testing<br>Answer:<br>Involves directly testing physical security mea- sures such as picking locks or bypassing alarm<br>security system<br>Q: Hardware Penetration Testing<br>Answer:<br>Occurs in organizations that manufacture hard- ware devices, such as network gear, TVs, or IoT<br>devices<br>Q: network segmentation<br>WGU C836 Fundamentals of Information<br>Security Exam | Complete Guide Questions<br>and Verified Answers| 2023\/ 2024 Update<\/p>\n\n\n\n<p>Answer:<br>The act of dividing a network into multiple smaller networks, each acting as its own small<br>network (subnet)<br>Q: choke points<br>Answer:<br>certain points in the network, such as routers, firewalls, or prox- ies, where we can inspect, filter,<br>and control network traffic<br>Q: redundancy<br>Answer:<br>a method of security that involves designing a network to always have another route if<br>something fails or loses connection<br>Q: firewall<br>Answer:<br>a mechanism for maintaining control over the traffic that flows into and out of our networks.<br>Create network segmentation when installed.<br>Q: packet filtering<br>Answer:<\/p>\n\n\n\n<p>A firewall technology that inspects the contents of each packet in traffic individually and makes<br>a gross determination (based on source and desti- nation IP address, port number, and the<br>protocol being used) of whether the traffic should be allowed to pass<br>Q: SPI (Stateful Packet Inspection)<br>Answer:<br>Uses what is called a state table to keep track of the connection and will only allow traffic that is<br>part of or already established connection.<br>Also function as packet filtering firewall, combining the two forms of filtering<br>Q: DPI (Deep Packet Inspection)<br>Answer:<br>a firewall technology that can analyze the actual content of the traffic that is flowing through<br>Reassemble the content of the traffic to look at what will be delivered to he applica- tion for<br>which is destined<br>Q: proxy server<br>Answer:<br>a specialized type of firewall that can serve as a choke point, in order to allow us to filter traffic<br>for attacks or undesirable content such as malware or traffic to Web sites hosting adult content<br>Q: DMZ (demilitarized zone)<\/p>\n\n\n\n<p>Answer:<br>a combination of a network design feature and a protective device such as a firewall.<br>Often used for systems that need to be exposed to external networks but are connected to our<br>own network (such as a web server)<br>Q: NIDS (Network intrusion detection system)<br>Answer:<br>A system that monitors network traffic and alerts for unauthorized activity<br>Q: Anomaly-based<br>Answer:<br>an IDS typically work by taking a baseline of the normal traffic and activity taking place on the<br>network<br>It can actually stand up against zero day attacks (have no signature)<br>Q: signature-based<br>Answer:<br>An IDS that maintains a database of signatures that might signal a particular type of attack and<br>compares incoming traffic to those signatures. Works in a very similar fashion to most antivirus<br>system.<br>Q: VPN (Virtual Private Network)<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-COMPLETE-GUIDE-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-COMPLETE-GUIDE-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.\"><\/object><a id=\"wp-block-file--media-4bcde7e8-b606-4bac-9db6-20b7156f3971\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-COMPLETE-GUIDE-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-COMPLETE-GUIDE-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-EXAM-COMPLETE-GUIDE-QUESTIONS-AND-VERIFIED-ANSWERS-2023-2024-UPDATE.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-4bcde7e8-b606-4bac-9db6-20b7156f3971\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Fundamentals of Information Security Exam | Complete Guide Questions and Verified Answers| 2023\/ 2024 Update Q: Dynamic AnalysisAnswer:Involves testing the application while it&#8217;s in operation. Testing the compiled binary form or therunning web application.Resembles real attacks against the applicationQ: Physical Penetration TestingAnswer:Involves directly testing physical security mea- sures such as picking locks or [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127588","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127588"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127588\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}