Wgu c836 stuvia - Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Wgu c836 stuvia? On this page you'll find 31 study documents about Wgu c836 stuvia.

Page 3 out of 31 results

Sort by

WGU C836 Exam Questions and Answers 100% Correct
  • WGU C836 Exam Questions and Answers 100% Correct

  • Exam (elaborations) • 3 pages • 2023
  • WGU C836 Exam Questions and Answers 100% CorrectWGU C836 Exam Questions and Answers 100% CorrectWGU C836 Exam Questions and Answers 100% CorrectSOX (Sarbanes-Oxley Act) - ANSWER-Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. FISMA (Federal Information Security Management Act) - ANSWER- PCI DSS (Payment Card Industry Data Security Standard) - ANSWER- Confidentiality - ANSWER-Confidentiality: integrity...
    (0)
  • $9.49
  • + learn more
WGU C836 CHAPTER 1-6 Questions and Answers (Graded A+)
  • WGU C836 CHAPTER 1-6 Questions and Answers (Graded A+)

  • Exam (elaborations) • 10 pages • 2023
  • FISMA (Federal Information Security Modernization Act) - ANSWER-this law provides a framework for ensuring the effectiveness of information security controls in federal government - changed from Management (2002) to Modernization in 2014 HIPAA (Health Insurance Portability and Accountability Act) - ANSWER-this law improves the efficiency and effectiveness of the health care system and protects patient privacy FERPA (Family Educational Rights and Privacy Act) - ANSWER-this law protects the...
    (0)
  • $10.49
  • + learn more
WGU C836 Fundamentals of Information Security (Unit 1)Correct 100%
  • WGU C836 Fundamentals of Information Security (Unit 1)Correct 100%

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Interception - ANSWERA type of attack, against confidentiality Interruption attack - ANSWERAn attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis Risk - ANSWERThe likelihood that something bad will happen Vulnerability - ANSWERA weakness that can be used to harm us Threat - ANSWERSome thing that has the potential to cause harm to our assets Interception - ANSWERA type of attack, primarily against confidentiality Availab...
    (0)
  • $9.99
  • + learn more
WGU C836 Fundamentals of Information Security Exam Questions and Answers (Graded A+)
  • WGU C836 Fundamentals of Information Security Exam Questions and Answers (Graded A+)

  • Exam (elaborations) • 8 pages • 2023
  • Which cybersecurity term is defined as the potential for an attack on resource? - Answer-Threat Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - Answer-Honeypots Which tool can be used to map devices on a network, along with their operating system and versions? - Answer-Port Scanner Which web attack is a server-side attack? - Answer-SQL injection An organization employs a VPN to safeguard its information. Which security principle is...
    (0)
  • $10.99
  • + learn more
WGU C836 Pre-Assessment Questions and Answers 100% Correct
  • WGU C836 Pre-Assessment Questions and Answers 100% Correct

  • Exam (elaborations) • 3 pages • 2023
  • Available in package deal
  • WGU C836 Pre-Assessment Questions and Answers 100% CorrectWGU C836 Pre-Assessment Questions and Answers 100% CorrectWGU C836 Pre-Assessment Questions and Answers 100% CorrectWGU C836 Pre-Assessment Questions and Answers 100% Correct At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - ANSWER-Integrity An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to ...
    (0)
  • $7.99
  • + learn more
WGU C836 CHAPTER 11 Questions and Answers (Graded A+)
  • WGU C836 CHAPTER 11 Questions and Answers (Graded A+)

  • Exam (elaborations) • 2 pages • 2023
  • OS hardening - ANSWER-the process of reducing the number of available avenues through which our OS might be attacked attack surface - ANSWER-The total of the areas through which our operating system might be attacked 6 main hardening categories - ANSWER-1. Removing unnecessary software 2. Removing or turning off unessential services 3. Making alterations to common accounts 4. Applying the principle of least privilege 5. Applying software updates in a timely manner 6. Making use of log...
    (0)
  • $8.99
  • + learn more
WGU C836 Pre-Assessment Questions & Answers 100% Correct
  • WGU C836 Pre-Assessment Questions & Answers 100% Correct

  • Exam (elaborations) • 3 pages • 2023
  • At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - ANSWER-Integrity An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to protect? - ANSWER-Integrity Which aspect of the CIA triad is violated by an unauthorized database roll back or undo? - ANSWER-Integrity A company's website has suffered several denial of service (DoS) attacks and wishes to thwa...
    (0)
  • $9.49
  • + learn more
WGU C836 Exam Questions and Answers 100% Correct(RATED A)
  • WGU C836 Exam Questions and Answers 100% Correct(RATED A)

  • Exam (elaborations) • 3 pages • 2023
  • SOX (Sarbanes-Oxley Act) - ANSWER-Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. FISMA (Federal Information Security Management Act) - ANSWER- PCI DSS (Payment Card Industry Data Security Standard) - ANSWER- Confidentiality - ANSWER-Confidentiality: integrity - ANSWER-Integrity: The systems you implement to ensure that data and programs cannot be altered without that modification being detectable. ...
    (0)
  • $9.49
  • + learn more
WGU C836 Fundamentals of Information Security (Unit 1) Questions & Answers 100% Correct
  • WGU C836 Fundamentals of Information Security (Unit 1) Questions & Answers 100% Correct

  • Exam (elaborations) • 2 pages • 2023
  • Interception -Answer- A type of attack, against confidentiality Interruption attack -Answer- An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis Risk -Answer- The likelihood that something bad will happen Vulnerability -Answer- A weakness that can be used to harm us Threat -Answer- Some thing that has the potential to cause harm to our assets Interception -Answer- A type of attack
    (0)
  • $8.99
  • + learn more
WGU C836 Fundamentals of Information Security (Unit 1) Questions & Answers 100% Correct
  • WGU C836 Fundamentals of Information Security (Unit 1) Questions & Answers 100% Correct

  • Exam (elaborations) • 2 pages • 2023
  • Interception -Answer- A type of attack, against confidentiality Interruption attack -Answer- An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis Risk -Answer- The likelihood that something bad will happen Vulnerability -Answer- A weakness that can be used to harm us Threat -Answer- Some thing that has the potential to cause harm to our assets Interception -Answer- A type of attack
    (0)
  • $8.99
  • + learn more