C836 - Fundamentals of Information Security-with 100% verified
answers-2022-2023
PRE-ASSESSMENT: FUNDAMENTALS OF INFORMATION SECURITY PGGO
Attempt #1
Status: Not Passed
1.
Which cybersecurity term is defined as the potential for an attack on a resource?
YOUR CORRECT
ANSWER ANSWER
Threat
Vulnerability
Risk
Impact
2.
Which security type deliberately exposes a system’s vulnerabilities or resources to an attacker?
YOUR CORRECT
ANSWER ANSWER
Intrusion detection
Intrusion prevention
Firewalls
Honeypots
A+ Page 1
, C836 - Fundamentals of Information Security-with 100% verified answers-2022-2023
3.
Which tool can be used to map devices on a network, along with their operating system types and versions?
YOUR CORRECT
ANSWER ANSWER
A+ Page 2
,2/26/2020 WGU Student Portal | Coaching Report
Port scanner
Stateful krewall
Packet klter
Packet sniffer
4.
Which web attack is a server-side attack?
YOUR CORRECT
ANSWER ANSWER
SQL injection
Cross-site scripting
Cross-site request forgery
Clickjacking
5.
An organization employs a VPN to safeguard its information.
Which security principle is protected by a VPN?
YOUR CORRECT
ANSWER ANSWER
Data in motion
Data in storage
Data at rest
Data in use
6.
, 2/26/2020 WGU Student Portal | Coaching Report
A malicious hacker was successful in a denial of service (DoS) attack against an institution’s mail server. Fortunately, no data was lost or altered while the server was offline.
Which type of attack is this?