100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM 2025 ACTUAL EXAM QUESTIONS AND DETAILED CORRECT ANSWERS (VERIFIED ANSWERS) | A+ GRADE $22.99   Add to cart

Exam (elaborations)

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM 2025 ACTUAL EXAM QUESTIONS AND DETAILED CORRECT ANSWERS (VERIFIED ANSWERS) | A+ GRADE

 2 views  0 purchase
  • Course
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM 2025 ACTUAL EXAM QUESTIONS AND DETAILED CORRECT ANSWERS (VERIFIED ANSWERS) | A+ GRADE

Preview 4 out of 58  pages

  • August 5, 2024
  • 58
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu c836
  • wgu c836
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
TUTORWAC
WGU C836 FUNDAMENTALS OF
INFORMATION SECURITY FINAL
EXAM 2025 ACTUAL EXAM QUESTIONS
AND DETAILED CORRECT ANSWERS
(VERIFIED ANSWERS) | A+ GRADE
A company's website has suffered several denial of
service (DoS) attacks and wishes to thwart future attacks.

Which security principle is the company addressing?

A Availability
B Authenticity
C Confidentiality
D Possession Correct Answer A

An organization has a requirement that all database
servers and file servers be configured to maintain
operations in the presence of a failure.

Which principle of the CIA triad is this requirement
implementing?

A Utility
B Integrity
C Availability
D Confidentiality Correct Answer C

,A company's IT policy manual states that "All company
computers, workstations, application servers, and mobile
devices must have current versions of antivirus software."

Which principle or concept of cybersecurity does this
policy statement impact?

A Accounting policy
B Operating system security
C Access control policy
D Physical security Correct Answer B

An organization's procedures document states that "All
electronic communications should be encrypted during
transmission across networks using encryption standards
specified in the data encryption policy."

Which security principle is this policy addressing?

A Interruption
B Confidentiality
C Control
D Availability Correct Answer B

A company's website policy states that "To gain access to
the corporate website, each employee must provide a
valid user name and password, and then answer one of
six security questions accurately."

Which type of security does the policy address?

,A Operations
B Physical
C Human element
D Application Correct Answer A

An organization notices unauthorized visitors following
employees through a restricted doorway.

Which vulnerability should be addressed in the
organization's security policy?

A Pretexting
B Phishing
C Baiting
D Tailgating Correct Answer D

A company wants to update its access control policy. The
company wants to prevent hourly employees from logging
in to company computers after business hours.

Which type of access control policy should be
implemented?

A Mandatory
B Physical
C Discretionary
D Attribute-based Correct Answer D

A new software development company has determined
that one of its proprietary algorithms is at a high risk for

, unauthorized disclosure. The company's security up to this
point has been fairly lax.

Which procedure should the company implement to
protect this asset?

A Transfer the algorithm onto servers in the demilitarized
zone.
B Store the algorithm on highly available servers.
C Relocate the algorithm to encrypted storage.
D Create multiple off-site backups of the algorithm.
Correct Answer C

An accounting firm stores financial data for many
customers. The company policy requires that employees
only access data for customers they are assigned to. The
company implements a written policy indicating an
employee can be fired for violating this requirement.

Which type of control has the company implemented?

A Deterrent
B Active
C Preventive
D Detective Correct Answer A

How can an operating system be hardened in accordance
to the principle of least privilege?

A Implement account auditing.
B Remove unneeded services.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller TUTORWAC. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

70840 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.99
  • (0)
  Add to cart