WGU C836 Fundamentals of Information Security (WGUC836)

Western Governors University

Here are the best resources to pass WGU C836 Fundamentals of Information Security (WGUC836). Find WGU C836 Fundamentals of Information Security (WGUC836) study guides, notes, assignments, and much more.

Page 4 out of 43 results

Sort by

C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED.
  • C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED.

  • Exam (elaborations) • 2 pages • 2023
  • C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED. Identity verification - -Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards Falsifying identification - -Authentication requirements help prevent this crime Authentication - -A set of methods we use to establish a claim of identity as being true Something you know - -A password is an example of this type of factor Something you are - -...
    (0)
  • $7.99
  • + learn more
WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+
  • WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+

  • Exam (elaborations) • 3 pages • 2023
  • WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+ The science of keeping information secure - -Cryptography The science of breaking through the encryption used to create ciphertext - -Cryptanalysis The overarching field of study that covers cryptography and cryptanalysis - -Cryptology The specifics of the process used to encrypt the plaintext or decrypt the ciphertext - -Cryptographic Algorithm Another name for unencrypted data - -Plaintext (or Cleart...
    (0)
  • $7.49
  • + learn more
WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified.
  • WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified.

  • Exam (elaborations) • 4 pages • 2023
  • WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified. At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - -Integrity An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to protect? - -Integrity Which aspect of the CIA triad is violated by an unauthorized database roll back or undo? - -Integrity A company's website has suffered s...
    (0)
  • $7.99
  • + learn more
Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED.
  • Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED.

  • Exam (elaborations) • 15 pages • 2023
  • Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED. Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Confidentiality - -Our ability to protect our data from those unauthorized to view it. Integrity - -The ability to prevent our data from being changed in an unauthorized or undesirable manner. Availability - -The ability to access our data when we n...
    (0)
  • $10.49
  • + learn more
C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+
  • C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+

  • Exam (elaborations) • 2 pages • 2023
  • C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+ OS hardening - -the process of reducing the number of available avenues through which our OS might be attacked attack surface - -The total of the areas through which our operating system might be attacked 6 main hardening categories - -1. Removing unnecessary software 2. Removing or turning off unessential services 3. Making alterations to common accounts 4. Applying the principle of least privilege 5. Applying software updat...
    (0)
  • $7.99
  • + learn more
WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED.
  • WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED.

  • Exam (elaborations) • 5 pages • 2023
  • WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED. Port scanner - -Which tool can be used to map devices on a network, along with their operating system types and versions? SQL Injection - -Which web attack is a server-side attack? Availability - -A company has had several successful denial of service (DoS) attacks on its email server. Which security principle is being attacked? SQL Injection - -Which web attack is possible due to a lack of input validation?...
    (0)
  • $8.49
  • + learn more
WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+
  • WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+

  • Exam (elaborations) • 45 pages • 2023
  • WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+ Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. The Confidentiality, Integrity, and Availability Triad (CIA) - -Three of the primary concepts in information security. Gives us a model by which we can think about and discuss security concepts, and tends to be very focused on security, as...
    (0)
  • $12.49
  • + learn more
C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED.
  • C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED.

  • Exam (elaborations) • 5 pages • 2023
  • C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED. What is information security? - -It is keeping data, hardware, and software secure from unauthorized access, use, disclosure, disruption, modification or destruction. What order should assets be protected in? - -Most important to least. People, data, hardware/software What is compliance? - -Compliance is a term that is used very often in the ITSEC community. Compliance is the requirements that are set forth by laws and i...
    (0)
  • $8.49
  • + learn more
Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED.
  • Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED.

  • Exam (elaborations) • 3 pages • 2023
  • Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED. Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - -honeypots which tool can be used to map devices on a network, along with their operating system types and versions? - -Port scanner Which web attack is a server-side attack? - -SQL injection An organizatio...
    (0)
  • $7.99
  • + learn more
WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), L
  • WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), L

  • Exam (elaborations) • 15 pages • 2023
  • WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), Laws and Regulations (6) What are the 4 basic tasks for access controls? ACL Allowing access, denying access, limiting access, and revoking access. What is a Sandbox? A set of resources devoted to a program, outside of which the entity...
    (0)
  • $9.49
  • + learn more