Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Fundamentals of Information Security Final Exam 2025–2026 Practice Questions and Answers Study Guide

Rating
-
Sold
-
Pages
56
Grade
A+
Uploaded on
16-04-2026
Written in
2025/2026

This document contains a comprehensive set of exam-style practice questions and verified answers for WGU C836 Fundamentals of Information Security. It covers essential topics such as cybersecurity principles, risk management, access control, cryptography basics, network security, and security policies. The material is designed to support exam preparation and strengthen understanding of core information security concepts.

Show more Read less
Institution
Course

Content preview

WGU C836 FUndamentals oF InFormatIon seCUrIty
FInal exam QUestIons and ansWers 2025–2026 |
WGU C836 oa real exam-style Q&a | latest
Updated stUdy GUIde WIth VerIFIed CorreCt
ansWers

Sample Exam Questions



1. Which of the following is a primary goal of information security?
• A) Increase software functionality
• B) Triple data storage capacity

• C) Maintain data confidentiality

• D) Enhance system usability

Correct Option: C) Maintain data confidentiality

Rationale: The primary goals of information security generally focus on ensuring
confidentiality, integrity, and availability of data. Confidentiality involves protecting information
from unauthorized access.



2. What is the principle of least privilege?

• A) Users should have all privileges for usability

• B) Users are granted only the minimum level of access necessary
• C) Access is revoked after completion of tasks

• D) Privileges are determined by IT professionals only

Correct Option: B) Users are granted only the minimum level of access necessary

Rationale: The principle of least privilege is a security practice that restricts user access rights to
the bare minimum permissions they need to perform their job functions.



3. Which type of attack involves overwhelming a system with traffic to render it unusable?
• A) Phishing

• B) Denial of Service (DoS)

,WGU C836 FUndamentals oF InFormatIon seCUrIty
FInal exam QUestIons and ansWers 2025–2026 |
WGU C836 oa real exam-style Q&a | latest
Updated stUdy GUIde WIth VerIFIed CorreCt
ansWers

• C) Man-in-the-Middle

• D) SQL Injection

Correct Option: B) Denial of Service (DoS)
Rationale: A Denial of Service attack aims to make a machine or network resource unavailable
by overwhelming it with a flood of illegitimate requests.


4. What is the purpose of encryption in data security?

• A) To protect data confidentiality during transmission

• B) To improve data integrity

• C) To enhance data accessibility

• D) To expedite data processing speed

Correct Option: A) To protect data confidentiality during transmission

Rationale: Encryption serves to protect the confidentiality of data by transforming it into a
format that is unreadable without the corresponding decryption key.


5. Which standard focuses on managing and protecting sensitive data?

• A) HIPAA

• B) PCI DSS

• C) NIST SP 800-53

• D) ISO 27001

Correct Option: B) PCI DSS

Rationale: The Payment Card Industry Data Security Standard (PCI DSS) is a set of security
standards designed to ensure that companies that accept, process, store, or transmit credit card
information maintain a secure environment.

,WGU C836 FUndamentals oF InFormatIon seCUrIty
FInal exam QUestIons and ansWers 2025–2026 |
WGU C836 oa real exam-style Q&a | latest
Updated stUdy GUIde WIth VerIFIed CorreCt
ansWers

6. Which of the following is a common method for preventing unauthorized access to a
network?

• A) Firewalls

• B) Intrusion Detection Systems (IDS)

• C) Access Control Lists (ACLs)
• D) Network Protocols

Correct Option: C) Access Control Lists (ACLs)

Rationale: ACLs help define who can access certain resources in a network, enforcing security
by allowing only authorized users or systems.



7. What does HTTPS stand for?

• A) Hypertext Transfer Protocol Standard

• B) Hypertext Transfer Protocol Secure

• C) Hypertext Transfer Privacy Standard

• D) Hypertext Transfer Protocol Secure Layer
Correct Option: B) Hypertext Transfer Protocol Secure

Rationale: HTTPS is the secure version of HTTP, which encrypts the data exchanged to protect
against interception.


8. A company experiences a data breach. Which of the following is the first action they
should take?

• A) Inform customers

• B) Contain the breach
• C) Identify the attack vector

, WGU C836 FUndamentals oF InFormatIon seCUrIty
FInal exam QUestIons and ansWers 2025–2026 |
WGU C836 oa real exam-style Q&a | latest
Updated stUdy GUIde WIth VerIFIed CorreCt
ansWers

• D) Restore data from backup

Correct Option: B) Contain the breach

Rationale: Containment should be the first step to prevent further data loss or damage.


9. What is a strong password policy likely to include?

• A) At least 5 characters

• B) A mix of letters, numbers, and symbols

• C) Easy-to-remember words

• D) Use of personal information

Correct Option: B) A mix of letters, numbers, and symbols
Rationale: A strong password combines various character types to enhance security, making it
much harder to guess or crack.


10. Which of the following is considered a social engineering attack?
• A) DDoS

• B) Pretexting

• C) SQL Injection

• D) Trojan Horse

Correct Option: B) Pretexting

Rationale: Pretexting involves creating a fabricated scenario to obtain information from a target,
often used in social engineering attacks.


11. What does MFA stand for in cybersecurity?

Written for

Course

Document information

Uploaded on
April 16, 2026
Number of pages
56
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TopGradeSolutions Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
95
Member since
2 year
Number of followers
9
Documents
13297
Last sold
4 days ago
TOPGRADESOLUTIONS

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
4.9

171 reviews

5
159
4
7
3
4
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions