WGU C836 -
FUNDAMENTALS OF
INFORMATION SECURITY
200+ (2025-2026 Full Exam Kit) Solved Q&A | Correct &
Verified Answers
100% Guaranteed Pass Rate
Complete exam WGU C836 - Fundamentals of Information
✓
coverage: Security
✓ 100% Accurate & Verified Questions and Answers
✓ Reviewed by Subject Matter Experts
✓ Updated for current exam objectives
✓ Instant digital download after purchase
Trusted by thousands of students and professionals worldwide • © 2025-2026
,Questions
Question 1
______ protects the privacy of students and their parents.
A PCI DSS
B FISMA
C HIPAA
D GLBA
E FERPA
Correct Answer
E
Question 2
The process of intelligence gathering and analysis to support business decisions is known as _______.
A Competitive business
B Business intelligence
C Business competition
D Counter intelligence
E Competitive intelligence
Correct Answer
E
Question 3
Begin to identify and categorize threats that could harm our assets.
Correct Answer
Step 2: Identify Threats
,Question 4
Which tool performs checks for many common server-side vulnerabilities, and creates an index of all the files and directories it
can see on the target Web server?
A MiniFuzz File Fuzzer
B BinScope Binary Analyzer
C Nessus
D Nikto/Wikto
E NetStumbler
Correct Answer
D
Question 5
An organization employs a VPN to safeguard its information.
Which security principle is protected by a VPN?
A Data in motion
B Data at rest
C Data in use
D Data in storage
Correct Answer
A
Question 6
What security strategy best protects an operating system from buffer overflow attacks?
A Apply software updates
B Implement executable space protection
C Install a host intrusion detection system
D Implement anti-malware tools
Correct Answer
B
, Question 7
Interception
Correct Answer
affects Confidentiality
Question 8
Your organization's network was recently the target of an attack. Fortunately, the new system you installed took action and refused
traffic from the source before you even had a chance to respond. What system did you install?
A An authorization system
B An intrusion detection system
C A logging system
D An intrusion prevention system
E An authentication system
Correct Answer
D
Question 9
The study that was conducted to discover the cause of the information leak during the Vietnam War was codenamed ________ and
is now considered a symbol of OPSEC.
A Vietnam Viper
B The Art of War
C Purple Dragon
D Sun Tzu
Correct Answer
C