100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 FUNDAMENTALS OF INFORMATION EXAM 2 PREP (A NEW UPDATED VERSION ) COMPLETE ACTUAL TEST QUESTIONS WITH WELL ELABORATED ANSWERS (CORRECT VERIFIED SOLUTIONS)

Rating
2.0
(1)
Sold
-
Pages
77
Grade
A+
Uploaded on
26-04-2025
Written in
2024/2025

WGU C836 FUNDAMENTALS OF INFORMATION EXAM 2 PREP (A NEW UPDATED VERSION ) COMPLETE ACTUAL TEST QUESTIONS WITH WELL ELABORATED ANSWERS (CORRECT VERIFIED SOLUTIONS)

Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Course

Document information

Uploaded on
April 26, 2025
Number of pages
77
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836 Fundamentals of Information Security EXAM Question
u u u u u u u




s and Answers 2023 - 2024 (Verified Answers)
u u u u u u u




Which cybersecurity term is defined as the potential for an attack on aresourc
u u u u u u u u u u u u u




e?


A Impact
u




B Vulnerability
u u




C Risk
u




D Threat ANS D
u u u




1. Which security type deliberately exposes a system's vulnerabilities orr
u u u u u u u u u




esources to an attacker?
u u u




A Intrusion detection
u u u




B Firewalls
u




C Honeypots
u




D Intrusion prevention ANS C
u u u u




2. Which tool can be used to map devices on a network, along with theiro
u u u u u u u u u u u u u u




perating system types and versions?
u u u u




A Packet sniffer
u u u




B Packet filter
u u u




C Port scanner
u u




1u/u39

,D Stateful firewall ANS C
u u u u




3. Which web attack is a server-side attack?
u u u u u u




A Clickjacking
u




B Cross-
u




site scriptingC SQL in
u u u u




jection
D Cross-site request forgery ANS C
u u u u u




4. An organization employs a VPN to safeguard its information.
u u u u u u u u u




Which security principle is protected by a VPN?
u u u u u u u




A Data in motion
u u u u




B Data at rest
u u u




C Data in use
u u u




D Data in storage ANS A
u u u u u




5. A malicious hacker was successful in a denial of service (DoS) attack agai
u u u u u u u u u u u u




nst an institution's mail server. Fortunately, no data was lost or alteredwhile
u u u u u u u u u u u u u




the server was offline.
u u u




2u/u39

,Which type of attack is this?
u u u u u




A Modification
u u




B Fabrication
u u




C Interception
u




D Interruption ANS D
u u u




6. A company has had several successful denial of service (DoS) attacks onit
u u u u u u u u u u u u




s email server.
u u




Which security principle is being attacked?
u u u u u u




A Possession
u




B Integrity
u




C Confidentiality
u u




D Availability AN
u u




SD
u




7. A new start-
u u




up company has started working on a social networking website.The compa
u u u u u u u u u u u




ny has moved all its source code to a cloud provider andwants to protect this
u u u u u u u u u u u u u u u u




source code from unauthorized access.
u u u u




Which cyber defense concept should the start-
u u u u u u




up company use to maintainthe confidentiality of its source code?
u u u u u u u u u u




A Alarm systems
u u




B Account permissions
u u u



3u/u39

, C Antivirus software
u u




D File encryption ANS D
u u u u




8. A company has an annual audit of installed software and data storage syst
u u u u u u u u u u u u




ems. During the audit, the auditor asks how the company's most criticaldata i
u u u u u u u u u u u u u




s used. This determination helps the auditor ensure that the proper defense
u u u u u u u u u u u u




mechanisms are in place to protect critical data.
u u u u u u u




Which principle of the Parkerian hexad is the auditor addressing?A
u u u u u u u u u u




u Possession
B Integrity
u




C Authenticity
u u




D Utility ANS
u u u




D




4u/u39
$20.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all reviews
7 months ago

2.0

1 reviews

5
0
4
0
3
0
2
1
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
JOHNNKABIRU Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
14
Member since
7 months
Number of followers
7
Documents
798
Last sold
1 week ago

4.7

596 reviews

5
451
4
97
3
39
2
6
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions