WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
EXAM PA COMPLETE 500 QUESTIONS WITH CORRECT
DETAILED ANSWERS LATEST UPDATE THIS YEAR - JUST
RELEASED
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY EXAM PA
QUESTION: A company has an annual audit of installed software and data storage systems.
During the audit, the auditor asks how the company's most critical data is used. This
determination helps the auditor ensure that the proper defense mechanisms are in place to
protect critical data.
Which principle of the Parkerian hexad is the auditor addressing?
Utility
Possession
Authenticity
Integrity - ANSWER-Utility
QUESTION: Which web attack is possible due to a lack of input validation?
1
,Page 2 of 193
SQL injection
Cross-site request forgery
Clickjacking
Extraneous files - ANSWER-SQL injection
QUESTION: Which cybersecurity term is defined as the potential for an attack on a resource?
Threat
Vulnerability
Risk
Impact - ANSWER-Threat
QUESTION: Which security type deliberately exposes a system's vulnerabilities or resources to
an attacker?
Intrusion detection
Intrusion prevention
2
,Page 3 of 193
Firewalls
Honeypots - ANSWER-Honeypots
QUESTION: An organization employs a VPN to safeguard its information.
Which security principle is protected by a VPN?
Data in motion
Data in storage
Data at rest
Data in use - ANSWER-Data in motion
At a small company, an employee makes an unauthorized data alteration.
Integrity
Confidentiality
Availability
3
, Page 4 of 193
Authenticity - ANSWER-Integrity
QUESTION: An organization plans to encrypt data in transit on a network.
Which aspect of data is the organization attempting to protect?
Authenticity
Possession
Availability
Integrity - ANSWER-Integrity
QUESTION: Which aspect of the CIA triad is violated by an unauthorized database roll back or
undo?
Integrity
Confidentiality
Availability
Identification - ANSWER-Integrity
4