WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+)
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+) WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW (2024) || Questions & Answers (Graded A+) The Fabrication attack type most commonly affects which principle(s) of the CIA triad? A. Availability B. Integrity C. Confidentiality D. Integrity and Availability E. Confidentiality and Integrity - ANSWER - Integrity and Availability The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.Integrity and Availability B.Confidentiality and Integrity C.Availability D.Integrity E.Confidentiality - ANSWER - Confidentiality Something that has the potential to cause harm to our assets is known as a(n) ________. A.Threat B.Impact C.Risk D.Vulnerability - ANSWER - Threat Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. A.Logical controls B.Administrative controls C.Physical controls - ANSWER - Logical Control What is the first and arguably one of the most important steps of the risk management process? A.Assess risks B.Mitigate risks C.Identify threats D.Assess vulnerabilities E.Identify assets - ANSWER - Identify assets Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - ANSWER - information security
Written for
- Institution
- WGU C836 Fundamentals of Information Security
- Course
- WGU C836 Fundamentals of Information Security
Document information
- Uploaded on
- March 21, 2024
- Number of pages
- 21
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
wgu c836 multicomprehensive final exam review
-
wgu c836 multicomprehensive final exam answers
-
wgu c836 multicomprehensive final exam questions
-
an attack that involves tampering with our assets
Also available in package deal