WGU C836 Fundamentals of Information Security (WGUC836)
Western Governors University
Page 3 out of 43 results
Sort by
-
C836 Module 1, Questions & answers. 100% Accurate. verified
- Exam (elaborations) • 5 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
C836 Module 1, Questions & answers. 100% Accurate. verified 
 
 
What is Information Security? - -protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction 
 
What are our single most valuable asset in business? - -people 
 
what is the goal of a security plan? - -to find the balance between protection, usability, and cost 
 
What should the cost of security never do? - -outstrip the value of what it is protecting 
 
When i...
-
WGU C836, Exam Questions and answers. 100% Accurate. VERIFIED.
- Exam (elaborations) • 3 pages • 2023
-
Available in package deal
-
- $7.99
- + learn more
WGU C836, Exam Questions and answers. 100% Accurate. VERIFIED. 
 
 
SOX (Sarbanes-Oxley Act) - -Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 
 
FISMA (Federal Information Security Management Act) - - 
 
PCI DSS (Payment Card Industry Data Security Standard) - - 
 
Confidentiality - -Confidentiality: 
 
integrity - -Integrity: The systems you implement to ensure
-
C836 Fundamentals of Information security Terms. Exam Questions and answers. VERIFIED.
- Exam (elaborations) • 21 pages • 2023
-
Available in package deal
-
- $11.49
- + learn more
C836 Fundamentals of Information security Terms. Exam Questions and answers. VERIFIED. 
 
 
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - -Information Security 
 
Companies that process credit card payments must comply with this set of standards - -Payment Card Industry Data Security Standard (PCI DSS) 
 
Used to keep something private or minimally known - -Confidentially 
 
Refers to the ability to prevent ou...
-
Fundamentals of Information Security C836, Exam Questions and answers, VERIFIED.
- Exam (elaborations) • 10 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
Fundamentals of Information Security C836, Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - -Honeypots 
 
Which tool can be used to map devices on a network, along with their operating system and versions? - -Port Scanner 
 
Which web attack is a server-side attack? - -SQL injection 
 
An organization employs a VP...
-
WGU C836 OA Study Guide (Overly Informative), Questions and answers, Verified.
- Exam (elaborations) • 19 pages • 2023
-
Available in package deal
-
- $10.49
- + learn more
WGU C836 OA Study Guide (Overly Informative), Questions and answers, Verified. 
 
 
CIA Triad - -Confidentiality, Integrity, Availability 
 
Parkerian hexad - -Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility 
 
Confidentiality - -Refers to our ability to protect our data from those who are not authorized to view it. 
 
Confidentiality can be compromise...
As you read this, a fellow student has made another $4.70
-
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW. Questions and answers, Rated A+
- Exam (elaborations) • 30 pages • 2023
-
Available in package deal
-
- $10.49
- + learn more
WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW. Questions and answers, Rated A+ 
 
 
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - -Integrity and Availability 
 
The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to per...
-
C836 CHAPTER 10 WGU, Exam Review Questions & Answers, VERIFIED.
- Exam (elaborations) • 3 pages • 2023
-
Available in package deal
-
- $7.99
- + learn more
C836 CHAPTER 10 WGU, Exam Review Questions & Answers, VERIFIED. 
 
 
security in network design - -This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy 
 
network segmentation - -The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet) 
 
choke points - -certain points in the network, such as routers, firewalls, or proxies, where we can inspe...
-
C836 CHAPTER 12 WGU, Exam Questions & Answers. VERIFIED.
- Exam (elaborations) • 3 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
C836 CHAPTER 12 WGU, Exam Questions & Answers. VERIFIED. 
 
 
buffer overflow (overrun) - -a type of software development problem that occurs when we do not properly account for the size of the data input into our applications 
 
bounds checking - -to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - -A type of software development vulnerability that occurs when mult...
-
WGU Course C836 - Fundamentals of Information Security Quizlet, Exam Questions & Answers. Graded A+. VERIFIED.
- Exam (elaborations) • 22 pages • 2023
-
Available in package deal
-
- $11.49
- + learn more
WGU Course C836 - Fundamentals of Information Security Quizlet, Exam Questions & Answers. Graded A+. VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - -Honeypots 
 
Which tool can be used to map devices on a network, along with their operating system types and versions? - -Port Scanner 
 
Which web attack is a server-side attack? - -SQL i...
-
Lesson 3 Authorization and Access Control- C836. Questions & Answers, Rated A+
- Exam (elaborations) • 11 pages • 2023
-
Available in package deal
-
- $8.49
- + learn more
Lesson 3 Authorization and Access Control- C836. Questions & Answers, Rated A+ 
 
 
Attributes of a particular individual, such as height - -Subject attributes 
 
allows us to specify where the party should be allowed or denied access, and access control enables us to manage this access at a more granular level. - -Authorization 
 
Authorization allows us to specify where the party should be allowed or denied access, and _________ enables us to manage this access at a more granular level. - -acc...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia