EXAM
Exam Solution ga
WGU Course C836 Fundamentals of Information Securit
ga ga ga ga ga ga
y Quizlet by Brian MacFarlane 2026 A+ GRADE ASSURE
ga ga ga ga ga ga ga ga
D COMPLETE SOLUTIONS AND VERIFIED ANSWERS (A9
ga ga ga ga ga ga
937)
QUESTION 1 ga
Term
ANSWER
Definition
QUESTION 2 ga
Which cybersecurity term is defined as the potential for an attack on a resource? A Impa
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
ct B Vulnerability C Risk D Threat
ga ga ga ga ga ga
ANSWER
D
QUESTION 3 ga
Which security type deliberately exposes a system's vulnerabilities or resources to an at
ga ga ga ga ga ga ga ga ga ga ga ga
tacker? A Intrusion detection B Firewalls C Honeypots D Intrusion prevention
ga ga ga ga ga ga ga ga ga ga
ANSWER
C
QUESTION 4 ga
Which tool can be used to map devices on a network, along with their operating system
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
types and versions? A Packet sniffer B Packet filter C Port scanner D Stateful firewall
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
,ANSWER
C
QUESTION 5 ga
Which web attack is a server-side attack? A Clickjacking B Cross-
ga ga ga ga ga ga ga ga ga ga
site scripting C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga ga
ANSWER
C
QUESTION 6 ga
An organization employs a VPN to safeguard its information. Which security principle is
ga ga ga ga ga ga ga ga ga ga ga ga ga
protected by a VPN? A Data in motion B Data at rest C Data in use D Data in storage
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
ANSWER
A
QUESTION 7 ga
A malicious hacker was successful in a denial of service (DoS) attack against an instituti
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
on's mail server. Fortunately, no data was lost or altered while the server was offline. W
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
hich type of attack is this? A Modification B Fabrication C Interception D Interruption
ga ga ga ga ga ga ga ga ga ga ga ga ga
ANSWER
D
QUESTION 8 ga
A company has had several successful denial of service (DoS) attacks on its email server.
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Which security principle is being attacked? A Possession B Integrity C Confidentiality D
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Availability
ANSWER
D
QUESTION 9 ga
A new start-
ga ga
up company has started working on a social networking website. The company has mov
ga ga ga ga ga ga ga ga ga ga ga ga ga
ed all its source code to a cloud provider and wants to protect this source code from una
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
,uthorized access. Which cyber defense concept should the start-
ga ga ga ga ga ga ga ga
up company use to maintain the confidentiality of its source code? A Alarm systems B Ac
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
count permissions C Antivirus software D File encryption
ga ga ga ga ga ga ga
ANSWER
D
QUESTION 10 ga
A company has an annual audit of installed software and data storage systems. During t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
he audit, the auditor asks how the company's most critical data is used. This determinati
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
on helps the auditor ensure that the proper defense mechanisms are in place to protect
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
critical data. Which principle of the Parkerian hexad is the auditor addressing? A Posses
ga ga ga ga ga ga ga ga ga ga ga ga ga
sion B Integrity C Authenticity D Utility
ga ga ga ga ga ga
ANSWER
D
QUESTION 11 ga
Which web attack is possible due to a lack of input validation? A Extraneous files B Click
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
jacking C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga
ANSWER
C
QUESTION 12 ga
Which file action implements the principle of confidentiality from the CIA triad? A Comp
ga ga ga ga ga ga ga ga ga ga ga ga ga
ression B Hash C Backup D Encryption
ga ga ga ga ga ga
ANSWER
D
QUESTION 13 ga
Which cyber defense concept suggests limiting permissions to only what is necessary to
ga ga ga ga ga ga ga ga ga ga ga ga ga
perform a particular task? A Authentication B Authorization C Defense in depth D Princi
ga ga ga ga ga ga ga ga ga ga ga ga ga
ple of least privilege
ga ga ga
ANSWER
D
, QUESTION 14 ga
A company institutes a new policy that "All office computer monitors must face toward e
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
mployees and must face away from doorways. The monitor screens must not be visible t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
o people visiting the office." Which principle of the CIA triad is this company applying? A
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Availability B Confidentiality C Utility D Integrity
ga ga ga ga ga ga ga
ANSWER
B
QUESTION 15 ga
At a small company, an employee makes an unauthorized data alteration. Which compo
ga ga ga ga ga ga ga ga ga ga ga ga
nent of the CIA triad has been compromised? A Confidentiality B Authenticity C Integrity
ga ga ga ga ga ga ga ga ga ga ga ga ga g
D Availability
a ga
ANSWER
C
QUESTION 16 ga
An organization plans to encrypt data in transit on a network. Which aspect of data is th
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
e organization attempting to protect? A Integrity B Possession C Availability D Authentic
ga ga ga ga ga ga ga ga ga ga ga ga
ity
ANSWER
A
QUESTION 17 ga
Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
A Availability B Identification C Integrity D Confidentiality
ga ga ga ga ga ga ga
ANSWER
C
QUESTION 18 ga
A company's website has suffered several denial of service (DoS) attacks and wishes to t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
hwart future attacks. Which security principle is the company addressing? A Availability
ga ga ga ga ga ga ga ga ga ga ga g
B Authenticity C Confidentiality D Possession
a ga ga ga ga ga
ANSWER
A
Exam Solution ga
WGU Course C836 Fundamentals of Information Securit
ga ga ga ga ga ga
y Quizlet by Brian MacFarlane 2026 A+ GRADE ASSURE
ga ga ga ga ga ga ga ga
D COMPLETE SOLUTIONS AND VERIFIED ANSWERS (A9
ga ga ga ga ga ga
937)
QUESTION 1 ga
Term
ANSWER
Definition
QUESTION 2 ga
Which cybersecurity term is defined as the potential for an attack on a resource? A Impa
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
ct B Vulnerability C Risk D Threat
ga ga ga ga ga ga
ANSWER
D
QUESTION 3 ga
Which security type deliberately exposes a system's vulnerabilities or resources to an at
ga ga ga ga ga ga ga ga ga ga ga ga
tacker? A Intrusion detection B Firewalls C Honeypots D Intrusion prevention
ga ga ga ga ga ga ga ga ga ga
ANSWER
C
QUESTION 4 ga
Which tool can be used to map devices on a network, along with their operating system
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
types and versions? A Packet sniffer B Packet filter C Port scanner D Stateful firewall
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
,ANSWER
C
QUESTION 5 ga
Which web attack is a server-side attack? A Clickjacking B Cross-
ga ga ga ga ga ga ga ga ga ga
site scripting C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga ga
ANSWER
C
QUESTION 6 ga
An organization employs a VPN to safeguard its information. Which security principle is
ga ga ga ga ga ga ga ga ga ga ga ga ga
protected by a VPN? A Data in motion B Data at rest C Data in use D Data in storage
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
ANSWER
A
QUESTION 7 ga
A malicious hacker was successful in a denial of service (DoS) attack against an instituti
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
on's mail server. Fortunately, no data was lost or altered while the server was offline. W
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
hich type of attack is this? A Modification B Fabrication C Interception D Interruption
ga ga ga ga ga ga ga ga ga ga ga ga ga
ANSWER
D
QUESTION 8 ga
A company has had several successful denial of service (DoS) attacks on its email server.
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Which security principle is being attacked? A Possession B Integrity C Confidentiality D
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Availability
ANSWER
D
QUESTION 9 ga
A new start-
ga ga
up company has started working on a social networking website. The company has mov
ga ga ga ga ga ga ga ga ga ga ga ga ga
ed all its source code to a cloud provider and wants to protect this source code from una
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
,uthorized access. Which cyber defense concept should the start-
ga ga ga ga ga ga ga ga
up company use to maintain the confidentiality of its source code? A Alarm systems B Ac
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
count permissions C Antivirus software D File encryption
ga ga ga ga ga ga ga
ANSWER
D
QUESTION 10 ga
A company has an annual audit of installed software and data storage systems. During t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
he audit, the auditor asks how the company's most critical data is used. This determinati
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
on helps the auditor ensure that the proper defense mechanisms are in place to protect
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
critical data. Which principle of the Parkerian hexad is the auditor addressing? A Posses
ga ga ga ga ga ga ga ga ga ga ga ga ga
sion B Integrity C Authenticity D Utility
ga ga ga ga ga ga
ANSWER
D
QUESTION 11 ga
Which web attack is possible due to a lack of input validation? A Extraneous files B Click
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
jacking C SQL injection D Cross-site request forgery
ga ga ga ga ga ga ga
ANSWER
C
QUESTION 12 ga
Which file action implements the principle of confidentiality from the CIA triad? A Comp
ga ga ga ga ga ga ga ga ga ga ga ga ga
ression B Hash C Backup D Encryption
ga ga ga ga ga ga
ANSWER
D
QUESTION 13 ga
Which cyber defense concept suggests limiting permissions to only what is necessary to
ga ga ga ga ga ga ga ga ga ga ga ga ga
perform a particular task? A Authentication B Authorization C Defense in depth D Princi
ga ga ga ga ga ga ga ga ga ga ga ga ga
ple of least privilege
ga ga ga
ANSWER
D
, QUESTION 14 ga
A company institutes a new policy that "All office computer monitors must face toward e
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
mployees and must face away from doorways. The monitor screens must not be visible t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
o people visiting the office." Which principle of the CIA triad is this company applying? A
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
Availability B Confidentiality C Utility D Integrity
ga ga ga ga ga ga ga
ANSWER
B
QUESTION 15 ga
At a small company, an employee makes an unauthorized data alteration. Which compo
ga ga ga ga ga ga ga ga ga ga ga ga
nent of the CIA triad has been compromised? A Confidentiality B Authenticity C Integrity
ga ga ga ga ga ga ga ga ga ga ga ga ga g
D Availability
a ga
ANSWER
C
QUESTION 16 ga
An organization plans to encrypt data in transit on a network. Which aspect of data is th
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
e organization attempting to protect? A Integrity B Possession C Availability D Authentic
ga ga ga ga ga ga ga ga ga ga ga ga
ity
ANSWER
A
QUESTION 17 ga
Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?
ga ga ga ga ga ga ga ga ga ga ga ga ga ga ga
A Availability B Identification C Integrity D Confidentiality
ga ga ga ga ga ga ga
ANSWER
C
QUESTION 18 ga
A company's website has suffered several denial of service (DoS) attacks and wishes to t
ga ga ga ga ga ga ga ga ga ga ga ga ga ga
hwart future attacks. Which security principle is the company addressing? A Availability
ga ga ga ga ga ga ga ga ga ga ga g
B Authenticity C Confidentiality D Possession
a ga ga ga ga ga
ANSWER
A