WGU C836 Fundamentals of Information Security EXAM Question
u u u u u u u
s and Answers 2023 - 2024 (Verified Answers)
u u u u u u u
Which cybersecurity term is defined as the potential for an attack on aresourc
u u u u u u u u u u u u u
e?
A Impact
u
B Vulnerability
u u
C Risk
u
D Threat ANS D
u u u
1. Which security type deliberately exposes a system's vulnerabilities orr
u u u u u u u u u
esources to an attacker?
u u u
A Intrusion detection
u u u
B Firewalls
u
C Honeypots
u
D Intrusion prevention ANS C
u u u u
2. Which tool can be used to map devices on a network, along with theiro
u u u u u u u u u u u u u u
perating system types and versions?
u u u u
A Packet sniffer
u u u
B Packet filter
u u u
C Port scanner
u u
1u/u39
,D Stateful firewall ANS C
u u u u
3. Which web attack is a server-side attack?
u u u u u u
A Clickjacking
u
B Cross-
u
site scriptingC SQL in
u u u u
jection
D Cross-site request forgery ANS C
u u u u u
4. An organization employs a VPN to safeguard its information.
u u u u u u u u u
Which security principle is protected by a VPN?
u u u u u u u
A Data in motion
u u u u
B Data at rest
u u u
C Data in use
u u u
D Data in storage ANS A
u u u u u
5. A malicious hacker was successful in a denial of service (DoS) attack agai
u u u u u u u u u u u u
nst an institution's mail server. Fortunately, no data was lost or alteredwhile
u u u u u u u u u u u u u
the server was offline.
u u u
2u/u39
,Which type of attack is this?
u u u u u
A Modification
u u
B Fabrication
u u
C Interception
u
D Interruption ANS D
u u u
6. A company has had several successful denial of service (DoS) attacks onit
u u u u u u u u u u u u
s email server.
u u
Which security principle is being attacked?
u u u u u u
A Possession
u
B Integrity
u
C Confidentiality
u u
D Availability AN
u u
SD
u
7. A new start-
u u
up company has started working on a social networking website.The compa
u u u u u u u u u u u
ny has moved all its source code to a cloud provider andwants to protect this
u u u u u u u u u u u u u u u u
source code from unauthorized access.
u u u u
Which cyber defense concept should the start-
u u u u u u
up company use to maintainthe confidentiality of its source code?
u u u u u u u u u u
A Alarm systems
u u
B Account permissions
u u u
3u/u39
, C Antivirus software
u u
D File encryption ANS D
u u u u
8. A company has an annual audit of installed software and data storage syst
u u u u u u u u u u u u
ems. During the audit, the auditor asks how the company's most criticaldata i
u u u u u u u u u u u u u
s used. This determination helps the auditor ensure that the proper defense
u u u u u u u u u u u u
mechanisms are in place to protect critical data.
u u u u u u u
Which principle of the Parkerian hexad is the auditor addressing?A
u u u u u u u u u u
u Possession
B Integrity
u
C Authenticity
u u
D Utility ANS
u u u
D
4u/u39
u u u u u u u
s and Answers 2023 - 2024 (Verified Answers)
u u u u u u u
Which cybersecurity term is defined as the potential for an attack on aresourc
u u u u u u u u u u u u u
e?
A Impact
u
B Vulnerability
u u
C Risk
u
D Threat ANS D
u u u
1. Which security type deliberately exposes a system's vulnerabilities orr
u u u u u u u u u
esources to an attacker?
u u u
A Intrusion detection
u u u
B Firewalls
u
C Honeypots
u
D Intrusion prevention ANS C
u u u u
2. Which tool can be used to map devices on a network, along with theiro
u u u u u u u u u u u u u u
perating system types and versions?
u u u u
A Packet sniffer
u u u
B Packet filter
u u u
C Port scanner
u u
1u/u39
,D Stateful firewall ANS C
u u u u
3. Which web attack is a server-side attack?
u u u u u u
A Clickjacking
u
B Cross-
u
site scriptingC SQL in
u u u u
jection
D Cross-site request forgery ANS C
u u u u u
4. An organization employs a VPN to safeguard its information.
u u u u u u u u u
Which security principle is protected by a VPN?
u u u u u u u
A Data in motion
u u u u
B Data at rest
u u u
C Data in use
u u u
D Data in storage ANS A
u u u u u
5. A malicious hacker was successful in a denial of service (DoS) attack agai
u u u u u u u u u u u u
nst an institution's mail server. Fortunately, no data was lost or alteredwhile
u u u u u u u u u u u u u
the server was offline.
u u u
2u/u39
,Which type of attack is this?
u u u u u
A Modification
u u
B Fabrication
u u
C Interception
u
D Interruption ANS D
u u u
6. A company has had several successful denial of service (DoS) attacks onit
u u u u u u u u u u u u
s email server.
u u
Which security principle is being attacked?
u u u u u u
A Possession
u
B Integrity
u
C Confidentiality
u u
D Availability AN
u u
SD
u
7. A new start-
u u
up company has started working on a social networking website.The compa
u u u u u u u u u u u
ny has moved all its source code to a cloud provider andwants to protect this
u u u u u u u u u u u u u u u u
source code from unauthorized access.
u u u u
Which cyber defense concept should the start-
u u u u u u
up company use to maintainthe confidentiality of its source code?
u u u u u u u u u u
A Alarm systems
u u
B Account permissions
u u u
3u/u39
, C Antivirus software
u u
D File encryption ANS D
u u u u
8. A company has an annual audit of installed software and data storage syst
u u u u u u u u u u u u
ems. During the audit, the auditor asks how the company's most criticaldata i
u u u u u u u u u u u u u
s used. This determination helps the auditor ensure that the proper defense
u u u u u u u u u u u u
mechanisms are in place to protect critical data.
u u u u u u u
Which principle of the Parkerian hexad is the auditor addressing?A
u u u u u u u u u u
u Possession
B Integrity
u
C Authenticity
u u
D Utility ANS
u u u
D
4u/u39