100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Course C836 - Fundamentals of Information Security Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!!

Rating
-
Sold
-
Pages
65
Grade
A+
Uploaded on
12-01-2026
Written in
2025/2026

WGU Course C836 - Fundamentals of Information Security Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. A company's IT policy manual states that "All company computers, workstations, application servers, and mobile devices must have current versions of antivirus software." Which principle or concept of cybersecurity does this policy statement impact? a) Accounting policy b) Operating system security c) Access control policy d) Physical security - ANSWER B 2. An organization's procedures document states that "All electronic communications should be encrypted during transmission across networks using encryption standards specified in the data encryption policy." Which security principle is this policy addressing? a) Interruption b) Confidentiality c) Control d) Availability - ANSWER B 3. A company's website policy states that "To gain access to the corporate website, each employee must provide a valid user name and password, and then answer one of six security questions accurately." Which type of security does the policy address? a) Operations b) Physical c) Human element d) Application - ANSWER A 4. An organization notices unauthorized visitors following employees through a restricted doorway. Which vulnerability should be addressed in the organization's security policy? a) Pretexting b) Phishing c) Baiting d) Tailgating - ANSWER D 5. A company wants to update its access control policy. The company wants to prevent hourly employees from logging in to company computers after business hours. Which type of access control policy should be implemented? a) Mandatory b) Physical c) Discretionary d) Attribute-based - ANSWER D 6. A new software development company has determined that one of its proprietary algorithms is at a high risk for unauthorized disclosure. The company's security up to this point has been fairly lax. Which procedure should the company implement to protect this asset? a) Transfer the algorithm onto servers in the demilitarized zone. b) Store the algorithm on highly available servers. c) Relocate the algorithm to encrypted storage. d) Create multiple off-site backups of the algorithm. - ANSWER C

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 12, 2026
Number of pages
65
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU Course C836 - Fundamentals of
Information Security

Comprehensive Resource To Help You Ace
2026-2027 Includes Frequently Tested
Questions With ELABORATED 100% Correct
COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!!

Current Update!!


1. A company's IT policy manual states that "All company computers,
workstations, application servers, and mobile devices must have current
versions of antivirus software."
Which principle or concept of cybersecurity does this policy statement impact?
a) Accounting policy
b) Operating system security
c) Access control policy
d) Physical security - ANSWER B


2. An organization's procedures document states that "All electronic
communications should be encrypted during transmission across networks
using encryption standards specified in the data encryption policy."
Which security principle is this policy addressing?
a) Interruption
b) Confidentiality

, c) Control
d) Availability - ANSWER B


3. A company's website policy states that "To gain access to the corporate
website, each employee must provide a valid user name and password, and
then answer one of six security questions accurately."
Which type of security does the policy address?
a) Operations
b) Physical
c) Human element
d) Application - ANSWER A


4. An organization notices unauthorized visitors following employees through a
restricted doorway.
Which vulnerability should be addressed in the organization's security policy?
a) Pretexting
b) Phishing
c) Baiting
d) Tailgating - ANSWER D


5. A company wants to update its access control policy. The company wants to
prevent hourly employees from logging in to company computers after
business hours.
Which type of access control policy should be implemented?
a) Mandatory
b) Physical
c) Discretionary

, d) Attribute-based - ANSWER D


6. A new software development company has determined that one of its
proprietary algorithms is at a high risk for unauthorized disclosure. The company's
security up to this point has been fairly lax.
Which procedure should the company implement to protect this asset?
a) Transfer the algorithm onto servers in the demilitarized zone.
b) Store the algorithm on highly available servers.
c) Relocate the algorithm to encrypted storage.
d) Create multiple off-site backups of the algorithm. - ANSWER C


6. An accounting firm stores financial data for many customers. The company
policy requires that employees only access data for customers they are
assigned to. The company implements a written policy indicating an employee
can be fired for violating this requirement.
Which type of control has the company implemented?
a) Deterrent
b) Active
c) Preventive
d) Detective - ANSWER A


7. How can an operating system be hardened in accordance to the principle of
least privilege?
a) Implement account auditing.
b) Remove unneeded services.
c) Restrict account permissions.
d) Remove unnecessary software. - ANSWER C

, 8. A company implements an Internet-facing web server for its sales force to
review product information. The sales force can also update its profiles and
profile photos, but not the product information. There is no other information
on this server.
Which content access permissions should be granted to the sales force based on
the principle of least privilege?
a) Read and limited write access
b) Read and write access
c) Limited write access only
d) Limited read access only - ANSWER A


9. A corporation has discovered that some confidential personnel information
has been used inappropriately.
How can the principle of least privilege be applied to limit access to confidential
personnel records?
a) Only allow access to those with elevated security permissions.
b) Only allow access to department heads and executives.
c) Only allow access to those who need access to perform their job.
d) Only allow access to those who work in the human resources department. -
ANSWER C


10. A user runs an application that has been infected with malware that is less
than 24 hours old. The malware then infects the operating system.
Which safeguard should be implemented to prevent this type of attack?
a) Install the latest security updates.
b) Uninstall unnecessary software.
c) Modify the default user accounts.
d) Limit user account privileges. - ANSWER D

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EWLindy Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
710
Member since
3 year
Number of followers
431
Documents
7425
Last sold
3 days ago
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
3.8

107 reviews

5
55
4
13
3
16
2
6
1
17

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions