WGU C836
Western Governors University
All 26 results
Sort by
C836 CHAPTER 1-6 WGU Questions and answers latest update
C836 Wgu Complete Questions and answers latest update
Wgu C836 Multi Comprehensive Final Exam Review Questions and answers latest update
WGU C836 OA Study Guide (Overly Informative) Questions and answers latest update
WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Questions and answers latest update
![WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED](/docpics/3891404/655fa3cc7957d_3891404_121_171.jpeg)
-
WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED
- Exam (elaborations) • 8 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
What are the 4 basic tasks for access controls? ACL 
Allowing access, denying access, limiting access, and revoking access. 
What is a Sandbox? 
A set of resources devoted to a program, outside of which the entity cannot operate. This is an access 
control method to prevent the untested code from accessing other resources they shouldn't be. 
How does a linux File ACL work in terms of permissions and user groupings? 
There is a user, group, and other and their permissions are in that order. Each ...
![WGU Course C836 - Fundamentals of Information Security. Exam Questions and answers, 100% Accurate, Verified.0ver 200 Questions | 22 Pages](/docpics/3891398/655fa391e496d_3891398_121_171.jpeg)
-
WGU Course C836 - Fundamentals of Information Security. Exam Questions and answers, 100% Accurate, Verified.0ver 200 Questions | 22 Pages
- Exam (elaborations) • 22 pages • 2023
- Available in package deal
-
- $16.49
- + learn more
1. Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
2. Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - 
-Honeypots 
3. Which tool can be used to map devices on a network, along with their operating system types 
and versions? - -Port Scanner 
4. Which web attack is a server-side attack? - -SQL injection 
5. An organization employs a VPN to safeguard its information. Which security principle is 
protect...
![WGU C836 Pre-Assessment, Questions and answers, 100% Accurate, APPROVED](/docpics/3891391/655fa354cc586_3891391_121_171.jpeg)
-
WGU C836 Pre-Assessment, Questions and answers, 100% Accurate, APPROVED
- Exam (elaborations) • 4 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA 
triad has been compromised? - -Integrity 
An organization plans to encrypt data in transit on a network. Which aspect of data is the organization 
attempting to protect? - -Integrity 
Which aspect of the CIA triad is violated by an unauthorized database roll back or undo? - -Integrity 
A company's website has suffered several denial of service (DoS) attacks and wishes to thwart future 
attacks. Wh...
![WGU C836 STUDY QUESTIONS & Answers, 100% Accurate, VERIFIED](/docpics/3891389/655fa3183518d_3891389_121_171.jpeg)
-
WGU C836 STUDY QUESTIONS & Answers, 100% Accurate, VERIFIED
- Exam (elaborations) • 10 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
What is the CIA triad in information security? - -Confidentiality, Integrity, and Availability. 
What is the main purpose of an information security procedure? - -The main purpose of an 
information security procedure is to provide step-by-step instructions for implementing and maintaining 
security controls, in accordance with the organization's security policies. 
What is the difference between a policy, a standard, and a procedure in the context of information 
security? - -A policy is a high...
![WGU C836 Fundamentals of Information Security, Questions and answers, VERIFIED](/docpics/3891382/655fa2dbd4be7_3891382_121_171.jpeg)
-
WGU C836 Fundamentals of Information Security, Questions and answers, VERIFIED
- Exam (elaborations) • 10 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - - 
Honeypots 
Which tool can be used to map devices on a network, along with their operating system and versions? - 
-Port Scanner 
Which web attack is a server-side attack? - -SQL injection 
An organization employs a VPN to safeguard its information. 
Which security principle is protected by a VPN? - -Data in...
![Verkoop je kennis op stuvia](https://www.stuvia.com/hosted-imgs/app/stock-fotos/banner_seller_big.jpg)
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for $15 each. Every. Single. Day. Discover all about earning on Stuvia