WGU D430 FUNDAMENTALS OF INFORMATIONS
r r r r r
ECURITY EXAM OBJECTIVE ASSESSMENT NEW r r r r
EST 2024 TEST BANK ACTUAL EXAM 300 r r r r r r
QUESTIONS AND CORRECT DETAILED ANSWERS( r r r r r
VERIFIED ANSWERS) |ALREADY GRADED A+ r r r r
A company wants to update its access control policy. The
r r r r r r r r r r
company wants to prevent hourly employees from loggin
r r r r r r r
g in to company computers after business hours.
r r r r r r r
Which type of access control policy should beim
r r r r r r r r
plemented?
A Mandatory
r r
B Physical
r
C Discretionary
r
D Attribute-based - ...ANSWER...D
r r r
A new software development company has determinedth
r r r r r r r
at one of its proprietary algorithms is at a high risk for una
r r r r r r r r r r r r
uthorized disclosure. The company's security upto this po
r r r r r r r r
int has been fairly lax.
r r r r
Which procedure should the company implement top
r r r r r r r
rotect this asset? r r
A Transfer the algorithm onto servers in thede
r r r r r r r r
militarized zone. r
B Store the algorithm on highly available servers.
r r r r r r r
,C Relocate the algorithm to encrypted storage.
r r r r r r
D Create multiple off-site backups of the algorithm. -
r r r r r r r r
...ANSWER...C
An accounting firm stores financial data for many custom
r r r r r r r r
ers. The company policy requires that employees only acc
r r r r r r r r
ess data for customers they are assigned to. The company
r r r r r r r r r
implements a written policyindicating an employee can b
r r r r r r r r r
e fired for violating this requirement.
r r r r r
Which type of control has the company implemented?A D
r r r r r r r r r
eterrent
B Active
r
C Preventive
r
D Detective - ...ANSWER...A
r r r
How can an operating system be hardened inaccordance t
r r r r r r r r r
o the principle of least privilege?
r r r r r
A Implement account auditing. B
r r r r r
Remove unneeded services. C R r r r r
estrict account permissions. r r
D Remove unnecessary software. - ...ANSWER...C
r r r r r
A company implements an Internet-
r r r r
facing web serverfor its sales force to review product inf
r r r r r r r r r r
ormation. The sales force can also update its profiles an
r r r r r r r r r
d profile photos, but not the product information. There is
r r r r r r r r r
no other information on this server.
r r r r r r
,Which content access permissions should be granted tothe
r r r r r r r r
sales force based on the principle of least privilege?
r r r r r r r r r
A Read and limited write accessB
r r r r r r r
Read and write access
r r r
C Limited write access only
r r r r
D Limited read access only - ...ANSWER...A
r r r r r r
A corporation has discovered that some confidential pers
r r r r r r r
onnel information has been used inappropriately.
r r r r r
How can the principle of least privilege be applied tolim
r r r r r r r r r r
it access to confidential personnel records?
r r r r r
A Only allow access to those with elevated securitype
r r r r r r r r r
rmissions.
B Only allow access to department heads andex
r r r r r r r r
ecutives.
C Only allow access to those who need access tope
r r r r r r r r r r
rform their job. r r
D Only allow access to those who work in the humanresou
r r r r r r r r r r r
rces department. - ...ANSWER...C
r r r
A user runs an application that has been infected withmal
r r r r r r r r r r
ware that is less than 24 hours old. The malware then infe
r r r r r r r r r r r
cts the operating system.
r r r
Which safeguard should be implemented to prevent thisty
r r r r r r r r
pe of attack?
r r
A Install the latest security updates.B
r r r r r r r
Uninstall unnecessary software. r r
, C Modify the default user accounts.
r r r r r
D Limit user account privileges. - ...ANSWER...D
r r r r r r
A company was the victim of a security breach resulting in
r r r r r r r r r r
stolen user credentials. An attacker used astolen userna
r r r r r r r r r
me and password to log in to an employee email account.
r r r r r r r r r r
Which security practice could have reduced the post-
r r r r r r r
breach impact of this event?
r r r r r
A Multi-r
factor authentication B Operati
r r r
ng system hardeningC Networ
r r r r
k segmentation
r
D Mutual authentication - ...ANSWER...A
r r r r
A module in a security awareness course shows a userma
r r r r r r r r r r
king use of two- r r r
factor authentication using a hardware token.
r r r r r
Which security failure is being addressed by thistr
r r r r r r r r
aining module? r
A Tailgating
r r
B Pretexting
r
C Malware infections
r r
D Weak passwords - ...ANSWER...D
r r r r
Which tool should an application developer use to helpide
r r r r r r r r r
ntify input validation vulnerabilities?
r r r
A scanner
r
r r r r r
ECURITY EXAM OBJECTIVE ASSESSMENT NEW r r r r
EST 2024 TEST BANK ACTUAL EXAM 300 r r r r r r
QUESTIONS AND CORRECT DETAILED ANSWERS( r r r r r
VERIFIED ANSWERS) |ALREADY GRADED A+ r r r r
A company wants to update its access control policy. The
r r r r r r r r r r
company wants to prevent hourly employees from loggin
r r r r r r r
g in to company computers after business hours.
r r r r r r r
Which type of access control policy should beim
r r r r r r r r
plemented?
A Mandatory
r r
B Physical
r
C Discretionary
r
D Attribute-based - ...ANSWER...D
r r r
A new software development company has determinedth
r r r r r r r
at one of its proprietary algorithms is at a high risk for una
r r r r r r r r r r r r
uthorized disclosure. The company's security upto this po
r r r r r r r r
int has been fairly lax.
r r r r
Which procedure should the company implement top
r r r r r r r
rotect this asset? r r
A Transfer the algorithm onto servers in thede
r r r r r r r r
militarized zone. r
B Store the algorithm on highly available servers.
r r r r r r r
,C Relocate the algorithm to encrypted storage.
r r r r r r
D Create multiple off-site backups of the algorithm. -
r r r r r r r r
...ANSWER...C
An accounting firm stores financial data for many custom
r r r r r r r r
ers. The company policy requires that employees only acc
r r r r r r r r
ess data for customers they are assigned to. The company
r r r r r r r r r
implements a written policyindicating an employee can b
r r r r r r r r r
e fired for violating this requirement.
r r r r r
Which type of control has the company implemented?A D
r r r r r r r r r
eterrent
B Active
r
C Preventive
r
D Detective - ...ANSWER...A
r r r
How can an operating system be hardened inaccordance t
r r r r r r r r r
o the principle of least privilege?
r r r r r
A Implement account auditing. B
r r r r r
Remove unneeded services. C R r r r r
estrict account permissions. r r
D Remove unnecessary software. - ...ANSWER...C
r r r r r
A company implements an Internet-
r r r r
facing web serverfor its sales force to review product inf
r r r r r r r r r r
ormation. The sales force can also update its profiles an
r r r r r r r r r
d profile photos, but not the product information. There is
r r r r r r r r r
no other information on this server.
r r r r r r
,Which content access permissions should be granted tothe
r r r r r r r r
sales force based on the principle of least privilege?
r r r r r r r r r
A Read and limited write accessB
r r r r r r r
Read and write access
r r r
C Limited write access only
r r r r
D Limited read access only - ...ANSWER...A
r r r r r r
A corporation has discovered that some confidential pers
r r r r r r r
onnel information has been used inappropriately.
r r r r r
How can the principle of least privilege be applied tolim
r r r r r r r r r r
it access to confidential personnel records?
r r r r r
A Only allow access to those with elevated securitype
r r r r r r r r r
rmissions.
B Only allow access to department heads andex
r r r r r r r r
ecutives.
C Only allow access to those who need access tope
r r r r r r r r r r
rform their job. r r
D Only allow access to those who work in the humanresou
r r r r r r r r r r r
rces department. - ...ANSWER...C
r r r
A user runs an application that has been infected withmal
r r r r r r r r r r
ware that is less than 24 hours old. The malware then infe
r r r r r r r r r r r
cts the operating system.
r r r
Which safeguard should be implemented to prevent thisty
r r r r r r r r
pe of attack?
r r
A Install the latest security updates.B
r r r r r r r
Uninstall unnecessary software. r r
, C Modify the default user accounts.
r r r r r
D Limit user account privileges. - ...ANSWER...D
r r r r r r
A company was the victim of a security breach resulting in
r r r r r r r r r r
stolen user credentials. An attacker used astolen userna
r r r r r r r r r
me and password to log in to an employee email account.
r r r r r r r r r r
Which security practice could have reduced the post-
r r r r r r r
breach impact of this event?
r r r r r
A Multi-r
factor authentication B Operati
r r r
ng system hardeningC Networ
r r r r
k segmentation
r
D Mutual authentication - ...ANSWER...A
r r r r
A module in a security awareness course shows a userma
r r r r r r r r r r
king use of two- r r r
factor authentication using a hardware token.
r r r r r
Which security failure is being addressed by thistr
r r r r r r r r
aining module? r
A Tailgating
r r
B Pretexting
r
C Malware infections
r r
D Weak passwords - ...ANSWER...D
r r r r
Which tool should an application developer use to helpide
r r r r r r r r r
ntify input validation vulnerabilities?
r r r
A scanner
r