{"id":127764,"date":"2023-11-26T23:25:20","date_gmt":"2023-11-26T23:25:20","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=127764"},"modified":"2023-11-26T23:25:21","modified_gmt":"2023-11-26T23:25:21","slug":"wgu-c836-fundamentals-of-information-security-2023-2024-update-final-exam-questions-and-verified-answers-grade-a","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/11\/26\/wgu-c836-fundamentals-of-information-security-2023-2024-update-final-exam-questions-and-verified-answers-grade-a\/","title":{"rendered":"WGU C836 Fundamentals of Information Security 2023\/ 2024 Update Final Exam | Questions and Verified Answers| Grade A"},"content":{"rendered":"\n<p>WGU C836 Fundamentals of Information Security 2023\/ 2024 Update Final Exam | Questions and Verified Answers| Grade A<\/p>\n\n\n\n<p>WGU C836 Fundamentals of Information<br>Security 2023\/ 2024 Update Final Exam |<br>Questions and Verified Answers| Grade A<br>QUESTION<br>The process of intelligence gathering and analysis to support business decisions is known as<br><em>.<br>A. Competitive intelligence<br>B. Competitive business<br>C. Business intelligence<br>D. Business competition<br>E. Counter intelligence<br>Answer:<br>A. Competitive intelligence<br>QUESTION<br>The study that was conducted to discover the cause of the information leak during the Vietnam<br>War was codenamed <strong><em>_<\/em><\/strong><\/em> and is now considered a symbol of OPSEC.<br>A. Sun Tzu<br>B. Vietnam Viper<br>C. The Art of War<br>D. Purple Dragon<br>Answer:<br>D. Purple Dragon<br>QUESTION<br>The process of intelligence gathering and analysis in order to support business decisions<br>Answer:<br>Competitive intelligence<\/p>\n\n\n\n<p>QUESTION<br>Name the five steps of the operations security process<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Identification of critical information<\/li>\n\n\n\n<li>Analysis of threats<\/li>\n\n\n\n<li>Analysis of vulnerabilities<\/li>\n\n\n\n<li>Assessment of risks<\/li>\n\n\n\n<li>Application of countermeasures<br>Answer:<\/li>\n\n\n\n<li>Identification of critical information<\/li>\n\n\n\n<li>Analysis of threats<\/li>\n\n\n\n<li>Analysis of vulnerabilities<\/li>\n\n\n\n<li>Assessment of risks<\/li>\n\n\n\n<li>Application of countermeasures<br>QUESTION<br>Haas&#8217; Laws of Operations Security: The First Law<br>Answer:<br>If you don&#8217;t know the threat, how do you know what to protect?<br>QUESTION<br>Haas&#8217; Laws of Operations Security: The Second Law<br>Answer:<br>If you don&#8217;t know what to protect, how do you know you are protecting it?<br>QUESTION<br>Haas&#8217; Laws of Operations Security: The Third Law<br>Answer:<br>If you are not protecting it, the dragon wins!<\/li>\n<\/ol>\n\n\n\n<p>QUESTION<br>The first step in the OPSEC process, and arguably the most important: to identify the assets that<br>most need protection and will cause us the most harm if exposed<br>Answer:<br>Identification of critical information<br>QUESTION<br>The second step in the OPSEC process: to look at the potential harm or financial impact that<br>might be caused by critical information being exposed, and who might exploit that exposure<br>Answer:<br>Analysis of threats<br>QUESTION<br>The third step in the OPSEC process: to look at the weaknesses that can be used to harm us<br>Answer:<br>Analysis of vulnerabilities<br>QUESTION<br>The fourth step in the OPSEC process: to determine what issues we really need to be concerned<br>about (areas with matching threats and vulnerabilities)<br>Answer:<br>Assessment of risks<br>QUESTION<br>The fifth step in the OPSEC process: to put measures in place to mitigate risks<\/p>\n\n\n\n<p>Answer:<br>Application of countermeasures<br>QUESTION<br>Name the most common security awareness issues<br>Protecting data, passwords, social engineering, network usage, malware, the use of personal<br>equipment, clean desk, policy knowledge<br>Answer:<br>Name the most common security awareness issues<br>Protecting data, passwords, social engineering, network usage, malware, the use of personal<br>equipment, clean desk, policy knowledge<br>QUESTION<br>A technique used by an attacker that relies on the willingness of people to help others<br>Answer:<br>Social engineering<br>QUESTION<br>A technique involving a fake identity and a believable scenario that elicits the target to give out<br>sensitive information or perform some action which they would not normally do for a stranger<br>Answer:<br>Pretexting<br>QUESTION<br>A social engineering technique that uses electronic communications (email, texts, or phone calls)<br>to convince a potential victim to give out sensitive information or perform some action<br>Answer:<br>Phishing<br>Powered by <a href=\"https:\/\/learnexams.com\/search\/study?query=\" target=\"_blank\" rel=\"noopener\">https:\/\/learnexams.com\/search\/study?query=<\/a><\/p>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-2023-2024-UPDATE-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-2023-2024-UPDATE-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A.\"><\/object><a id=\"wp-block-file--media-0480f673-61c0-44a1-a277-282afb8dff6d\" href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-2023-2024-UPDATE-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A.pdf\" target=\"_blank\" rel=\"noopener\">WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-2023-2024-UPDATE-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A<\/a><a href=\"https:\/\/learnexams.com\/blog\/wp-content\/uploads\/2023\/11\/WGU-C836-FUNDAMENTALS-OF-INFORMATION-SECURITY-2023-2024-UPDATE-FINAL-EXAM-QUESTIONS-AND-VERIFIED-ANSWERS-GRADE-A.pdf\" class=\"wp-block-file__button wp-element-button\" aria-describedby=\"wp-block-file--media-0480f673-61c0-44a1-a277-282afb8dff6d\" download target=\"_blank\" rel=\"noopener\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>WGU C836 Fundamentals of Information Security 2023\/ 2024 Update Final Exam | Questions and Verified Answers| Grade A WGU C836 Fundamentals of InformationSecurity 2023\/ 2024 Update Final Exam |Questions and Verified Answers| Grade AQUESTIONThe process of intelligence gathering and analysis to support business decisions is known as.A. Competitive intelligenceB. Competitive businessC. Business intelligenceD. Business competitionE. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-127764","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127764","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=127764"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/127764\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=127764"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=127764"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=127764"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}