WGU Course C836 - Fundamentals of Information Security
Newest Exam 2024 -2025 Updated Questions with 100%
Correct Verified Answers/ Graded A+
A health company must comply with HIPAA regulations. It decides to encrypt databases
that contain HIPAA information.
Which resource is the health company directly trying to protect?
A Operating system
B Server
C Data
D Application - Correct Answer - C
A file is stored in a marketing folder and is accessible only to members of the marketing
group. An attacker uses a phishing scam to gain the credentials of a user who is a
member of the marketing group, and then reads the file.
Which leg of the CIA triad is being targeted?
A Control
B Integrity
C Availability
D Confidentiality - Correct Answer - D
An attacker performs a buffer overflow attack on an organization's web server. The web
server locks up and must be restarted to restore functionality.
Which part of the CIA triad is under attack?
pg. 1
,A Confidentiality
B Integrity
C Control
D Availability - Correct Answer - D
Some malware hides itself by replacing some system administrator commands on a
server, but the server continues to function normally for its users.
Which component of the CIA triad has been compromised?
A Confidentiality
B Integrity
B Availability
D Authenticity - Correct Answer - B
Which component of the CIA triad will be impacted if an attacker cuts network cables?
A Availability
B Confidentiality
C Authenticity
D Integrity - Correct Answer - A
A bank wants to ensure user interactions with the online banking website are
confidential.
Which security solution should be implemented?
A SSH/FTP
B AES
pg. 2
,C SSL/TLS
D VPN - Correct Answer - C
What is an example of symmetric key encryption?
A MD5
B RSA
C AES
D ECC - Correct Answer - C
Which asymmetric cryptographic algorithm can provide confidentiality for data in
motion?
A AES
B MD5
C RSA
D 3DES - Correct Answer - C
A company has just completed an audit of disaster protection strategies. The company
has decided it must keep and be able to retrieve backup data for a period of 30 years.
The company has implemented tape backups using 8mm digital audio tapes.
Which factor could impact the company's ability to access information from the backup
tapes?
A Tape access speed
B Technical obsolescence
C Reading tape header
D Network speed - Correct Answer - B
pg. 3
, A military installation is evaluating backup solutions for its critical data. This installation
operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.
Which physical media should be selected to ensure the integrity of backups is preserved
given these harsh operating conditions?
A Optical media
B Flash drives
C Tape media
D Hard drives - Correct Answer - B
A university research group wants to collect data on animals that are native to southern
Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the
edge of a national park and to use optical media to backup photos and research notes.
Which physical or environmental factor may damage their optical media?
A Humidity
B Temperature
C Magnetic fields
D Electric shocks - Correct Answer - B
In the system room of a small company, an emergency power shut-down switch was
installed right next to a light switch. As a result, employees sometimes shut down the
power accidentally when they leave the data center.
Which type of control should be implemented to mitigate the risk of accidental shut
down?
A Physical
B Administrative
C Logical
pg. 4
Newest Exam 2024 -2025 Updated Questions with 100%
Correct Verified Answers/ Graded A+
A health company must comply with HIPAA regulations. It decides to encrypt databases
that contain HIPAA information.
Which resource is the health company directly trying to protect?
A Operating system
B Server
C Data
D Application - Correct Answer - C
A file is stored in a marketing folder and is accessible only to members of the marketing
group. An attacker uses a phishing scam to gain the credentials of a user who is a
member of the marketing group, and then reads the file.
Which leg of the CIA triad is being targeted?
A Control
B Integrity
C Availability
D Confidentiality - Correct Answer - D
An attacker performs a buffer overflow attack on an organization's web server. The web
server locks up and must be restarted to restore functionality.
Which part of the CIA triad is under attack?
pg. 1
,A Confidentiality
B Integrity
C Control
D Availability - Correct Answer - D
Some malware hides itself by replacing some system administrator commands on a
server, but the server continues to function normally for its users.
Which component of the CIA triad has been compromised?
A Confidentiality
B Integrity
B Availability
D Authenticity - Correct Answer - B
Which component of the CIA triad will be impacted if an attacker cuts network cables?
A Availability
B Confidentiality
C Authenticity
D Integrity - Correct Answer - A
A bank wants to ensure user interactions with the online banking website are
confidential.
Which security solution should be implemented?
A SSH/FTP
B AES
pg. 2
,C SSL/TLS
D VPN - Correct Answer - C
What is an example of symmetric key encryption?
A MD5
B RSA
C AES
D ECC - Correct Answer - C
Which asymmetric cryptographic algorithm can provide confidentiality for data in
motion?
A AES
B MD5
C RSA
D 3DES - Correct Answer - C
A company has just completed an audit of disaster protection strategies. The company
has decided it must keep and be able to retrieve backup data for a period of 30 years.
The company has implemented tape backups using 8mm digital audio tapes.
Which factor could impact the company's ability to access information from the backup
tapes?
A Tape access speed
B Technical obsolescence
C Reading tape header
D Network speed - Correct Answer - B
pg. 3
, A military installation is evaluating backup solutions for its critical data. This installation
operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.
Which physical media should be selected to ensure the integrity of backups is preserved
given these harsh operating conditions?
A Optical media
B Flash drives
C Tape media
D Hard drives - Correct Answer - B
A university research group wants to collect data on animals that are native to southern
Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the
edge of a national park and to use optical media to backup photos and research notes.
Which physical or environmental factor may damage their optical media?
A Humidity
B Temperature
C Magnetic fields
D Electric shocks - Correct Answer - B
In the system room of a small company, an emergency power shut-down switch was
installed right next to a light switch. As a result, employees sometimes shut down the
power accidentally when they leave the data center.
Which type of control should be implemented to mitigate the risk of accidental shut
down?
A Physical
B Administrative
C Logical
pg. 4