WGU C836 Fundamentals of Information Security (WGUC836)
Western Governors University
All 43 results
Sort by
-
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (100% VERIFIED)
- Exam (elaborations) • 6 pages • 2024
-
- $16.49
- + learn more
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (100% VERIFIED) Port scanner - Correct answer Which tool can be used to map devices on a 
network, along with their operating system types and versions? 
 SQL Injection - Correct answer Which web attack is a server-side attack? 
 Availability - Correct answer A company has had several successful denial of 
service (DoS) attacks on its email server. 
 Which security principle is being attacked? 
 SQL Injection...
-
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (GRADED A+)
- Exam (elaborations) • 6 pages • 2024
-
- $15.49
- + learn more
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (GRADED A+) Port scanner - Correct answer Which tool can be used to map devices on a 
network, along with their operating system types and versions? 
 SQL Injection - Correct answer Which web attack is a server-side attack? 
 Availability - Correct answer A company has had several successful denial of 
service (DoS) attacks on its email server. 
 Which security principle is being attacked? 
 SQL Injection - C...
-
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (Guaranteed Pass)
- Exam (elaborations) • 6 pages • 2024
-
- $14.99
- + learn more
WGU C836 Pre-assessment Exam Questions and Answers Latest Updated 2024/2025 (Guaranteed Pass) Port scanner - Correct answer Which tool can be used to map devices on a 
network, along with their operating system types and versions? 
 SQL Injection - Correct answer Which web attack is a server-side attack? 
 Availability - Correct answer A company has had several successful denial of 
service (DoS) attacks on its email server. 
 Which security principle is being attacked? 
 SQL Injecti...
-
WGU C836 Final Exam Questions With Correct Answers Latest 2024 (100% Verified)
- Exam (elaborations) • 24 pages • 2024
-
Available in package deal
-
- $17.99
- + learn more
WGU C836 Final Exam Questions With Correct Answers Latest 2024 (100% Verified) The Fabrication attack type most commonly affects which principle(s) of the CIA 
triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity 
(Ans- Integrity and Availability 
The Interception attack type most commonly affects which principle(s) of the CIA 
triad? This task contains the radio buttons and checkboxes for options. The 
shortcut keys to perfor...
-
WGU C836 (Fundamentals of Information Security) Final Exam Questions and Answers Latest 2024 Graded A+
- Exam (elaborations) • 34 pages • 2024
-
Available in package deal
-
- $17.99
- + learn more
WGU C836 (Fundamentals of Information Security) Final Exam Questions and Answers Latest 2024 Graded A+. Which cybersecurity term is defined as the potential for an attack on a resource? 
A Impact 
B Vulnerability 
C Risk 
D Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion prevention 
Which tool can be used to map devices on a network, along with their operating system types 
and...
Get paid weekly? You can!
-
WGU C836 Comprehensive Final Exam Questions With 100% Verified Answers Latest 2023/2024 & WGU C836 Final Exam Questions With Correct Answers Latest 2023/2024 Graded A+
- Package deal • 2 items • 2023
-
- $22.49
- + learn more
WGU C836 Comprehensive Final Exam Questions With 100% Verified Answers Latest 2023/2024 & WGU C836 Final Exam Questions With Correct Answers Latest 2023/2024 Graded A+

-
WGU C836 Fundamentals of Information Security, Exam Questions and answers, 100% Accurate, VERIFIED.
- Exam (elaborations) • 8 pages • 2023
-
Available in package deal
-
- $9.49
- + learn more
WGU C836 Fundamentals of Information 
Security, Exam Questions and answers, 
100% Accurate, VERIFIED. 
 
What are the 4 basic tasks for access controls? ACL 
Allowing access, denying access, limiting access, and revoking access. 
What is a Sandbox? 
A set of resources devoted to a program, outside of which the entity cannot operate. This is an access 
control method to prevent the untested code from accessing other resources they shouldn't be. 
How does a linux File ACL work in terms o...
-
WGU C836 Pre-Assessment, Questions and answers, 100% Accurate, APPROVED.
- Exam (elaborations) • 4 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
WGU C836 Pre-Assessment, Questions 
and answers, 100% Accurate, 
APPROVED. 
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA 
triad has been compromised? - -Integrity 
An organization plans to encrypt data in transit on a network. Which aspect of data is the organization 
attempting to protect? - -Integrity 
Which aspect of the CIA triad is violated by an unauthorized database roll back or undo? - -Integrity 
A company's website has suffe...
-
WGU C836 STUDY QUESTIONS & Answers, 100% Accurate, VERIFIED. 2024/25
- Exam (elaborations) • 10 pages • 2023
-
Available in package deal
-
- $10.49
- + learn more
WGU C836 STUDY QUESTIONS & 
Answers, 100% Accurate, VERIFIED. 
What is the CIA triad in information security? - -Confidentiality, Integrity, and Availability. 
What is the main purpose of an information security procedure? - -The main purpose of an 
information security procedure is to provide step-by-step instructions for implementing and maintaining 
security controls, in accordance with the organization's security policies. 
What is the difference between a policy, a standard, and a pr...
-
WGU C836 Fundamentals of Information Security, Questions and answers, VERIFIED. 2024/25
- Exam (elaborations) • 10 pages • 2023
-
Available in package deal
-
- $9.49
- + learn more
WGU C836 Fundamentals of Information 
Security, Questions and answers, 
VERIFIED. 
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - 
Honeypots 
Which tool can be used to map devices on a network, along with their operating system and versions? - 
-Port Scanner 
Which web attack is a server-side attack? - -SQL injection 
An organization employs a VPN...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia