Package deal
WGU C836 Fundamentals of Information Security BUNDLE.
WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. VERIFIED.
[Show more]WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. VERIFIED.
[Show more]WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. 
What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), Laws and Regulations (6) 
 
What are the 4 ba...
Preview 2 out of 15 pages
Add to cartWGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. 
What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), Laws and Regulations (6) 
 
What are the 4 ba...
Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - -honeypots 
 
w...
Preview 1 out of 3 pages
Add to cartFundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - -honeypots 
 
w...
C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED. 
 
 
What is information security? - -It is keeping data, hardware, and software secure from unauthorized access, use, disclosure, disruption, modification or destruction. 
 
What order should assets be protected in? - -Most important ...
Preview 2 out of 5 pages
Add to cartC836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED. 
 
 
What is information security? - -It is keeping data, hardware, and software secure from unauthorized access, use, disclosure, disruption, modification or destruction. 
 
What order should assets be protected in? - -Most important ...
WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+ 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
The Confidentiality, Integrity, and Ava...
Preview 4 out of 45 pages
Add to cartWGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+ 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
The Confidentiality, Integrity, and Ava...
WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED. 
 
 
Port scanner - -Which tool can be used to map devices on a network, along with their operating system types and versions? 
 
SQL Injection - -Which web attack is a server-side attack? 
 
Availability - -A company has had seve...
Preview 2 out of 5 pages
Add to cartWGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED. 
 
 
Port scanner - -Which tool can be used to map devices on a network, along with their operating system types and versions? 
 
SQL Injection - -Which web attack is a server-side attack? 
 
Availability - -A company has had seve...
C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+ 
 
 
OS hardening - -the process of reducing the number of available avenues through which our OS might be attacked 
 
attack surface - -The total of the areas through which our operating system might be attacked 
 
6 main hardening categories ...
Preview 1 out of 2 pages
Add to cartC836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+ 
 
 
OS hardening - -the process of reducing the number of available avenues through which our OS might be attacked 
 
attack surface - -The total of the areas through which our operating system might be attacked 
 
6 main hardening categories ...
Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED. 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
Confidentiality - -Our ability to protect our data from...
Preview 2 out of 15 pages
Add to cartFundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED. 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
Confidentiality - -Our ability to protect our data from...
WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified. 
 
 
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - -Integrity 
 
An organization plans to encrypt data in transit on a network. Which aspect of data...
Preview 1 out of 4 pages
Add to cartWGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified. 
 
 
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - -Integrity 
 
An organization plans to encrypt data in transit on a network. Which aspect of data...
WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+ 
 
 
The science of keeping information secure - -Cryptography 
 
The science of breaking through the encryption used to create ciphertext - -Cryptanalysis 
 
The overarching field of study that covers cryptography and cry...
Preview 1 out of 3 pages
Add to cartWGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+ 
 
 
The science of keeping information secure - -Cryptography 
 
The science of breaking through the encryption used to create ciphertext - -Cryptanalysis 
 
The overarching field of study that covers cryptography and cry...
C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED. 
 
 
Identity verification - -Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards 
 
Falsifying identification - -Authentication requirements help prevent ...
Preview 1 out of 2 pages
Add to cartC836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED. 
 
 
Identity verification - -Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards 
 
Falsifying identification - -Authentication requirements help prevent ...
Lesson 3 Authorization and Access Control- C836. Questions & Answers, Rated A+ 
 
 
Attributes of a particular individual, such as height - -Subject attributes 
 
allows us to specify where the party should be allowed or denied access, and access control enables us to manage this access at a more gr...
Preview 2 out of 11 pages
Add to cartLesson 3 Authorization and Access Control- C836. Questions & Answers, Rated A+ 
 
 
Attributes of a particular individual, such as height - -Subject attributes 
 
allows us to specify where the party should be allowed or denied access, and access control enables us to manage this access at a more gr...
WGU Course C836 - Fundamentals of Information Security Quizlet, Exam Questions & Answers. Graded A+. VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an a...
Preview 3 out of 22 pages
Add to cartWGU Course C836 - Fundamentals of Information Security Quizlet, Exam Questions & Answers. Graded A+. VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an a...
C836 CHAPTER 12 WGU, Exam Questions & Answers. VERIFIED. 
 
 
buffer overflow (overrun) - -a type of software development problem that occurs when we do not properly account for the size of the data input into our applications 
 
bounds checking - -to set a limit on the amount of data we expect to r...
Preview 1 out of 3 pages
Add to cartC836 CHAPTER 12 WGU, Exam Questions & Answers. VERIFIED. 
 
 
buffer overflow (overrun) - -a type of software development problem that occurs when we do not properly account for the size of the data input into our applications 
 
bounds checking - -to set a limit on the amount of data we expect to r...
C836 CHAPTER 10 WGU, Exam Review Questions & Answers, VERIFIED. 
 
 
security in network design - -This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy 
 
network segmentation - -The act of divid...
Preview 1 out of 3 pages
Add to cartC836 CHAPTER 10 WGU, Exam Review Questions & Answers, VERIFIED. 
 
 
security in network design - -This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy 
 
network segmentation - -The act of divid...
C836 WGU COMPLETE, Exam Questions and answers, Graded A+. verified. 
 
 
bounds checking - -to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - -A type of software deve...
Preview 3 out of 24 pages
Add to cartC836 WGU COMPLETE, Exam Questions and answers, Graded A+. verified. 
 
 
bounds checking - -to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - -A type of software deve...
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW. Questions and answers, Rated A+ 
 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - -Integri...
Preview 3 out of 30 pages
Add to cartWGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW. Questions and answers, Rated A+ 
 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - -Integri...
WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane. Questions and answers, Rated A+ 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat - -D 
 
Which security type deliberately exposes a...
Preview 4 out of 50 pages
Add to cartWGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane. Questions and answers, Rated A+ 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat - -D 
 
Which security type deliberately exposes a...
WGU C836 OA Study Guide (Overly Informative), Questions and answers, Verified. 
 
 
CIA Triad - -Confidentiality, Integrity, Availability 
 
Parkerian hexad - -Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as wel...
Preview 3 out of 19 pages
Add to cartWGU C836 OA Study Guide (Overly Informative), Questions and answers, Verified. 
 
 
CIA Triad - -Confidentiality, Integrity, Availability 
 
Parkerian hexad - -Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as wel...
C836 CHAPTER 1-6 WGU. Exam Questions and answers, rated A+. VERIFIED. 
 
 
FISMA (Federal Information Security Modernization Act) - -this law provides a framework for ensuring the effectiveness of information security controls in federal government 
- changed from Management (2002) to Modernization ...
Preview 2 out of 13 pages
Add to cartC836 CHAPTER 1-6 WGU. Exam Questions and answers, rated A+. VERIFIED. 
 
 
FISMA (Federal Information Security Modernization Act) - -this law provides a framework for ensuring the effectiveness of information security controls in federal government 
- changed from Management (2002) to Modernization ...
Fundamentals of Information Security C836, Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - -Honeypots 
 
Which too...
Preview 2 out of 10 pages
Add to cartFundamentals of Information Security C836, Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - -Honeypots 
 
Which too...
C836 Fundamentals of Information security Terms. Exam Questions and answers. VERIFIED. 
 
 
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - -Information Security 
 
Companies that process credit card payments must c...
Preview 3 out of 21 pages
Add to cartC836 Fundamentals of Information security Terms. Exam Questions and answers. VERIFIED. 
 
 
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - -Information Security 
 
Companies that process credit card payments must c...
WGU C836, Exam Questions and answers. 100% Accurate. VERIFIED. 
 
 
SOX (Sarbanes-Oxley Act) - -Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 
 
FISMA (Federal Information Security Management Act) - - 
 
PCI DSS (P...
Preview 1 out of 3 pages
Add to cartWGU C836, Exam Questions and answers. 100% Accurate. VERIFIED. 
 
 
SOX (Sarbanes-Oxley Act) - -Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 
 
FISMA (Federal Information Security Management Act) - - 
 
PCI DSS (P...
WGU C836 Fundamentals of Information Security (Unit 1), Questions and answers. VERIFIED/. 
 
 
Interception - -A type of attack, against confidentiality 
 
Interruption attack - -An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
Risk...
Preview 1 out of 3 pages
Add to cartWGU C836 Fundamentals of Information Security (Unit 1), Questions and answers. VERIFIED/. 
 
 
Interception - -A type of attack, against confidentiality 
 
Interruption attack - -An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
Risk...
C836 Module 1, Questions & answers. 100% Accurate. verified 
 
 
What is Information Security? - -protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction 
 
What are our single most valuable asset in business? - -people 
 
wh...
Preview 2 out of 5 pages
Add to cartC836 Module 1, Questions & answers. 100% Accurate. verified 
 
 
What is Information Security? - -protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction 
 
What are our single most valuable asset in business? - -people 
 
wh...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PassPoint02. Stuvia facilitates payment to the seller.
No, you only buy these notes for $35.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
82191 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now