100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU Course C836 - Fundamentals of Information Security Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!!

Puntuación
-
Vendido
-
Páginas
65
Grado
A+
Subido en
12-01-2026
Escrito en
2025/2026

WGU Course C836 - Fundamentals of Information Security Comprehensive Resource To Help You Ace Includes Frequently Tested Questions With ELABORATED 100% Correct COMPLETE SOLUTIONS Guaranteed Pass First Attempt!! Current Update!! 1. A company's IT policy manual states that "All company computers, workstations, application servers, and mobile devices must have current versions of antivirus software." Which principle or concept of cybersecurity does this policy statement impact? a) Accounting policy b) Operating system security c) Access control policy d) Physical security - ANSWER B 2. An organization's procedures document states that "All electronic communications should be encrypted during transmission across networks using encryption standards specified in the data encryption policy." Which security principle is this policy addressing? a) Interruption b) Confidentiality c) Control d) Availability - ANSWER B 3. A company's website policy states that "To gain access to the corporate website, each employee must provide a valid user name and password, and then answer one of six security questions accurately." Which type of security does the policy address? a) Operations b) Physical c) Human element d) Application - ANSWER A 4. An organization notices unauthorized visitors following employees through a restricted doorway. Which vulnerability should be addressed in the organization's security policy? a) Pretexting b) Phishing c) Baiting d) Tailgating - ANSWER D 5. A company wants to update its access control policy. The company wants to prevent hourly employees from logging in to company computers after business hours. Which type of access control policy should be implemented? a) Mandatory b) Physical c) Discretionary d) Attribute-based - ANSWER D 6. A new software development company has determined that one of its proprietary algorithms is at a high risk for unauthorized disclosure. The company's security up to this point has been fairly lax. Which procedure should the company implement to protect this asset? a) Transfer the algorithm onto servers in the demilitarized zone. b) Store the algorithm on highly available servers. c) Relocate the algorithm to encrypted storage. d) Create multiple off-site backups of the algorithm. - ANSWER C

Mostrar más Leer menos
Institución
Grado











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
12 de enero de 2026
Número de páginas
65
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU Course C836 - Fundamentals of
Information Security

Comprehensive Resource To Help You Ace
2026-2027 Includes Frequently Tested
Questions With ELABORATED 100% Correct
COMPLETE SOLUTIONS

Guaranteed Pass First Attempt!!

Current Update!!


1. A company's IT policy manual states that "All company computers,
workstations, application servers, and mobile devices must have current
versions of antivirus software."
Which principle or concept of cybersecurity does this policy statement impact?
a) Accounting policy
b) Operating system security
c) Access control policy
d) Physical security - ANSWER B


2. An organization's procedures document states that "All electronic
communications should be encrypted during transmission across networks
using encryption standards specified in the data encryption policy."
Which security principle is this policy addressing?
a) Interruption
b) Confidentiality

, c) Control
d) Availability - ANSWER B


3. A company's website policy states that "To gain access to the corporate
website, each employee must provide a valid user name and password, and
then answer one of six security questions accurately."
Which type of security does the policy address?
a) Operations
b) Physical
c) Human element
d) Application - ANSWER A


4. An organization notices unauthorized visitors following employees through a
restricted doorway.
Which vulnerability should be addressed in the organization's security policy?
a) Pretexting
b) Phishing
c) Baiting
d) Tailgating - ANSWER D


5. A company wants to update its access control policy. The company wants to
prevent hourly employees from logging in to company computers after
business hours.
Which type of access control policy should be implemented?
a) Mandatory
b) Physical
c) Discretionary

, d) Attribute-based - ANSWER D


6. A new software development company has determined that one of its
proprietary algorithms is at a high risk for unauthorized disclosure. The company's
security up to this point has been fairly lax.
Which procedure should the company implement to protect this asset?
a) Transfer the algorithm onto servers in the demilitarized zone.
b) Store the algorithm on highly available servers.
c) Relocate the algorithm to encrypted storage.
d) Create multiple off-site backups of the algorithm. - ANSWER C


6. An accounting firm stores financial data for many customers. The company
policy requires that employees only access data for customers they are
assigned to. The company implements a written policy indicating an employee
can be fired for violating this requirement.
Which type of control has the company implemented?
a) Deterrent
b) Active
c) Preventive
d) Detective - ANSWER A


7. How can an operating system be hardened in accordance to the principle of
least privilege?
a) Implement account auditing.
b) Remove unneeded services.
c) Restrict account permissions.
d) Remove unnecessary software. - ANSWER C

, 8. A company implements an Internet-facing web server for its sales force to
review product information. The sales force can also update its profiles and
profile photos, but not the product information. There is no other information
on this server.
Which content access permissions should be granted to the sales force based on
the principle of least privilege?
a) Read and limited write access
b) Read and write access
c) Limited write access only
d) Limited read access only - ANSWER A


9. A corporation has discovered that some confidential personnel information
has been used inappropriately.
How can the principle of least privilege be applied to limit access to confidential
personnel records?
a) Only allow access to those with elevated security permissions.
b) Only allow access to department heads and executives.
c) Only allow access to those who need access to perform their job.
d) Only allow access to those who work in the human resources department. -
ANSWER C


10. A user runs an application that has been infected with malware that is less
than 24 hours old. The malware then infects the operating system.
Which safeguard should be implemented to prevent this type of attack?
a) Install the latest security updates.
b) Uninstall unnecessary software.
c) Modify the default user accounts.
d) Limit user account privileges. - ANSWER D
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EWLindy Harvard University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
710
Miembro desde
3 año
Número de seguidores
431
Documentos
7425
Última venta
3 días hace
EN.CY.CLO.PE.DI.A

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Lee mas Leer menos
3.8

107 reseñas

5
55
4
13
3
16
2
6
1
17

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes