C836 - FUNDAMENTALS OF
INFORMATION SECURITY (WGU)
QUESTIONS WITH COMPLETE
SOLUTIONS
InformationaSecuritya-
aans✔✔Protectingaanaorganization'sainformationaandainformationasystemsafromaunauthoriz
edaaccess,ause,adisclosure,adisruption,amodification,aoradestruction.
Compliancea-aans✔✔Requirementsathataareasetaforthabyalawsaand
industryaregulations.
CIAa-aans✔✔Confidentiality,aIntegrity,aAvailability
Confidentialitya-
aans✔✔Refersatoaouraabilityatoaprotectaouradataafromathoseawhoaareanotaauthorizedatoause/v
iewait
Integritya-
aans✔✔Theaabilityatoapreventapeopleafromachangingayouradataainaanaunauthorizedaoraunde
sirableamanner
Availabilitya-aans✔✔Refersatoatheaabilityatoaaccessaouradataawhenaweaneedait
Possession/Controla-
aans✔✔refersatoatheaphysicaladispositionaofatheamediaaonawhichatheadataaisastored.a(tapeae
xamplesawhereasomeaareaencryptedaandasomeaareanot)
Authenticitya-
aans✔✔whetherayou've aattributedatheadataainaquestionatoatheaproperaowneraoracreator.a(alt
eredaemailathatasaysait'safromaoneapersonawhenait'sanota-
aviolationaofatheaauthenticityaofatheaemail)
Utilitya-aans✔✔refersatoahowausefulatheadataaisatoayou.
Attacksa-aans✔✔interception,ainterruption,amodification,aand
fabrication
Interceptiona-
aans✔✔attacksathataallowaunauthorizedausersatoaaccessayouradata,aapplications,aoraenviro
nments.aAreaprimarilyaattacksaagainstaconfidentiality
,Interruptiona-
aans✔✔attacksathatamakeayouraassetsaunusableaoraunavailableatoayouatemporarilyaoraperm
anently.aDoSaattackaonaaamailaserver,aforaexample.aMayaalsoaaffectaintegrity
Modificationa-
aans✔✔attacksainvolveatamperingawithaouraasset.aSuchaattacksamightaprimarilyabeaconside
redaanaintegrityaattackabutacouldaalsoarepresentaanaavailabilityaattack.
Fabricationa-
aans✔✔attacksainvolveageneratingadata,aprocesses,acommunications,aoraotherasimilaraacti
vitiesawithaaasystem.aFabricationaattacksaprimarilyaaffectaintegrityabutacouldabeaconsidereda
anaavailabilityaattackaasawell.
Riska-aans✔✔isathealikelihoodathataanaeventawillaoccur.aToahaveariskathereamustabeaa
threataandavulnerability.
Threatsa-aans✔✔areaanyaeventsabeingaman-
made,anaturalaoraenvironmentalathatacouldacauseadamageatoaassets.
Vulnerabilitiesa-
aans✔✔areaaaweaknessathataaathreataeventaoratheathreataagentacanatakeaadvantageaof.
Impacta-
aans✔✔takesaintoaaccountatheavalueaofatheaassetabeingathreatenedaandausesaitatoacalculate
arisk
RiskaManagementaProcessa-
aans✔✔Identifyaassets,aidentifyathreats,aassessavulnerabilities,aassessarisks,amitigatearisks
DefenseainaDeptha-aans✔✔Usingamultiplealayersaofasecurityatoadefendayouraassets.
Controlsa-
aans✔✔areatheawaysaweaprotectaassets.aThreeadifferentatypes:aphysical,alogical,aadministr
ative
PhysicalaControlsa-
aans✔✔environment;aphysicalaitemsathataprotectaassetsathinkalocks,adoors,aguards,aand,afe
ncesaoraenvironmentalafactorsa(time)
LogicalaControlsa-
aans✔✔Sometimesacalledatechnicalacontrols,atheseaprotectatheasystems,anetworks,aandae
nvironmentsathataprocess,atransmit,aandastoreaouradata
, AdministrativeaControlsa-
aans✔✔basedaonalaws, arules,apolicies,aandaprocedures,aguidelines,aandaotheraitemsathataa
rea"paper"ainanature.aTheyaareatheapoliciesathataorganizationsacreateaforagovernance.aForae
xample,aacceptableauseaandaemailauseapolicies.
Preparationa-
aans✔✔phaseaofaincidentaresponseaconsistsaofaallaofatheaactivitiesathataweacanaperform,aina
advanceaofatheaincidentaitself,ainaorderatoabetteraenableausatoahandleait.
IncidentaResponseaProcessa-aans✔✔1.aPreparation
2.aDetectionaandaAnalysisa(Identification)
3.aContainment
4.aEradication
5.aRecovery
6.aPost-incidentaactivity:adocument/Lessonsalearned
Detectiona&aAnalysisa-
aans✔✔whereatheaactionabeginsatoahappenainaouraincidentaresponseaprocess.aInathisaphas
e,aweawilladetectatheaoccurrenceaofaanaissueaandadecideawhetheraoranotaitaisaactuallyaanainci
dent,asoathataweacanarespondaappropriatelyatoait.
Containmenta-
aans✔✔involvesatakingastepsatoaensureathatatheasituationadoesanotacauseaanyamoreadamag
eathanaitaalreadyahas,aoratoaataleastalessenaanyaongoingaharm.
Eradicationa-aans✔✔attemptatoaremoveatheaeffectsaofatheaissueafromaouraenvironment.
Recoverya-aans✔✔restoringadevicesaoradataatoapre-
incidentastatea(rebuildingasystems,areloadingaapplications,abackupamedia,aetc.)
Post-incidentaactivitya-
aans✔✔determineaspecificallyawhatahappened,awhyaitahappened,aandawhataweacanadoatoak
eepaitafromahappeningaagain.a(postmortem).
Identitya-aans✔✔whoaorawhataweaclaimatoabe.aSimplyaanaassertion.
Authenticationa-
aans✔✔theaactaofaprovidingawhoaorawhataweaclaimatoabe.aMoreatechnically,atheasetaofameth
odsausedatoaestablishawhetheraaaclaimaisatrue
Verificationa-
aans✔✔simplyaverifiesastatusaofaID.aForaexample,ashowingayouradriver'salicenseaataaabar.a"
Half-step"abetweenaidentityaandaauthentication