100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU COURSE C836 - FUNDAMENTALS OF INFORMATION SECURITY 2024 QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
70
Grade
A+
Uploaded on
01-09-2024
Written in
2024/2025

WGU COURSE C836 - FUNDAMENTALS OF INFORMATION SECURITY 2024 QUESTIONS AND ANSWERS

Institution
WGU COURSE C836 - FUNDAMENTALS OF INFORMATION
Course
WGU COURSE C836 - FUNDAMENTALS OF INFORMATION











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU COURSE C836 - FUNDAMENTALS OF INFORMATION
Course
WGU COURSE C836 - FUNDAMENTALS OF INFORMATION

Document information

Uploaded on
September 1, 2024
Number of pages
70
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU COURSE C836 - FUNDAMENTALS
OF INFORMATION SECURITY

Which software development vulnerability occurs when multiple processes
control or share access to a particular resource, and the correct handling of that
resource depends on the proper ordering or timing of transactions?



A Authentication attacks

B Input validation attacks

C Race conditions

D Buffer overflows

E Authorization attacks - ANSWERS-C



Which Microsoft fuzzing tool examines source code for general good practices?



A MiniFuzz File Fuzzer

B BinScope Binary Analyzer

C Nessus

D Nikto/Wikto

,E Burp Suite - ANSWERS-B



Which tool performs checks for many common server-side vulnerabilities, and
creates an index of all the files and directories it can see on the target Web
server?



A MiniFuzz File Fuzzer

B BinScope Binary Analyzer

C Nessus

D Nikto/Wikto

E NetStumbler - ANSWERS-D



Which of the following is not a major category of database security issues?



A Privilege escalation

B Arbitrary code execution

C Unauthenticated access

D Improper indexing

E Protocol issues - ANSWERS-D



Which type of tool bombards our application with data and inputs from a wide
variety of sources in an attempt to cause the application to fail or behave
unexpectedly?

,A Fuzzers

B Web application analysis tools

C Exploit frameworks

D Scanners

E Vulnerability assessment tools - ANSWERS-A



What is information security?



A Protecting information and information systems from unauthorized trust, use,
disclosure, disruption, modification, or destruction.



B Protecting information and information systems from unauthorized access, use,
degradation, disruption, modification, or destruction.



C Protecting information and information systems from unauthorized access, use,
disclosure, displacement, modification, or destruction.



D Protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction. - ANSWERS-D




Which cybersecurity term is defined as the potential for an attack on a resource?

, A Impact

B Vulnerability

C Risk

D Threat - ANSWERS-D



Which security type deliberately exposes a system's vulnerabilities or resources to
an attacker?



A Intrusion detection

B Firewalls

C Honeypots

D Intrusion prevention - ANSWERS-C



Which tool can be used to map devices on a network, along with their operating
system types and versions?



A Packet sniffer

B Packet filter

C Port scanner

D Stateful firewall - ANSWERS-C

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Teacher101 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
389
Member since
1 year
Number of followers
71
Documents
9179
Last sold
1 day ago

Quality is my middle name.....100% ...my policy is to create and nurture people of quality by continuous education and training.....i guaranteed good grades 100% Feel free to get in touch through inbox...anything regarding help or issue with the exams posted... Finally after purchase please leave a good rating if satisfied with my work.... All the best as we continue working to improve ourselves through education

4.6

265 reviews

5
217
4
14
3
24
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions