100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C836 - Fundamentals of Information Security (WGU) Questions with Detailed Verified Answers

Rating
-
Sold
-
Pages
41
Grade
A+
Uploaded on
07-01-2026
Written in
2025/2026

nformation Security Ans: Protecting an organization's information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Compliance Ans: Requirements that are set forth by laws and industry regulations. CIA Ans: Confidentiality, Integrity, Availability Confidentiality Ans: Refers to our ability to protect our data from those who are not authorized to use/view it Integrity Ans: The ability to prevent people from changing your data in an unauthorized or undesirable manner Availability Ans: Refers to the ability to access our data when we need it Possession/Control Ans: refers to the physical disposition of the media on which the data is stored. (tape examples where some are encrypted and some are not) Authenticity Ans: whether you've attributed the data in question to the proper owner or creator. (altered email that says it's from Page | 2 one person when it's not - violation of the authenticity of the email) Utility Ans: refers to how useful the data is to you. Attacks Ans: interception, interruption, modification, and fabrication Interception Ans: attacks that allow unauthorized users to access your data, applications, or environments. Are primarily attacks against confidentiality Interruption Ans: attacks that make your assets unusable or unavailable to you temporarily or permanently. DoS attack on a mail server, for example. May also affect integrity Modification Ans: attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack but could also represent an availability attack. Fabrication Ans: attacks involve generating data, processes, communications, or other similar activities with a system. Fabrication attacks primarily affect integrity but could be considered an availability attack as well. Risk Ans: is the likelihood that an event will occur. To have risk there must be a threat and vulnerability. Page | 3 Threats Ans: are any events being man-made, natural or environmental that could cause damage to assets. Vulnerabilities Ans: are a weakness that a threat event or the threat agent can take advantage of. Impact Ans: takes into account the value of the asset being threatened and uses it to calculate risk Risk Management Process Ans: Identify assets, identify threats, assess vulnerabilities, assess risks, mitigate risks Defense in Dep

Show more Read less
Institution
C836
Course
C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836
Course
C836

Document information

Uploaded on
January 7, 2026
Number of pages
41
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1




C836 - Fundamentals of Information
Security (WGU) Questions with
Detailed Verified Answers
Information Security Ans: Protecting an organization's information
and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.

Compliance Ans: Requirements that are set forth by laws and

industry regulations.

CIA Ans: Confidentiality, Integrity, Availability

Confidentiality Ans: Refers to our ability to protect our data from
those who are not authorized to use/view it

Integrity Ans: The ability to prevent people from changing your
data in an unauthorized or undesirable manner

Availability Ans: Refers to the ability to access our data when we
need it

Possession/Control Ans: refers to the physical disposition of the
media on which the data is stored. (tape examples where some
are encrypted and some are not)

Authenticity Ans: whether you've attributed the data in question
to the proper owner or creator. (altered email that says it's from

, Page | 2

one person when it's not - violation of the authenticity of the
email)

Utility Ans: refers to how useful the data is to you.

Attacks Ans: interception, interruption, modification, and

fabrication

Interception Ans: attacks that allow unauthorized users to access
your data, applications, or environments. Are primarily attacks
against confidentiality

Interruption Ans: attacks that make your assets unusable or
unavailable to you temporarily or permanently. DoS attack on a
mail server, for example. May also affect integrity

Modification Ans: attacks involve tampering with our asset. Such
attacks might primarily be considered an integrity attack but
could also represent an availability attack.

Fabrication Ans: attacks involve generating data, processes,
communications, or other similar activities with a system.
Fabrication attacks primarily affect integrity but could be
considered an availability attack as well.

Risk Ans: is the likelihood that an event will occur. To have risk
there must be a

threat and vulnerability.

, Page | 3

Threats Ans: are any events being man-made, natural or
environmental that could cause damage to assets.

Vulnerabilities Ans: are a weakness that a threat event or the
threat agent can take advantage of.

Impact Ans: takes into account the value of the asset being
threatened and uses it to calculate risk

Risk Management Process Ans: Identify assets, identify threats,
assess vulnerabilities, assess risks, mitigate risks

Defense in Depth Ans: Using multiple layers of security to defend
your assets.

Controls Ans: are the ways we protect assets. Three different
types: physical, logical, administrative

Physical Controls Ans: environment; physical items that protect
assets think locks, doors, guards, and, fences or environmental
factors (time)

Logical Controls Ans: Sometimes called technical controls, these
protect the systems, networks, and environments that process,
transmit, and store our data

Administrative Controls Ans: based on laws, rules, policies, and
procedures, guidelines, and other items that are "paper" in nature.
They are the policies that organizations create for governance.
For example, acceptable use and email use policies.

, Page | 4

Preparation Ans: phase of incident response consists of all of the
activities that we can perform, in advance of the incident itself, in
order to better enable us to handle it.

Incident Response Process Ans: 1. Preparation

2. Detection and Analysis (Identification)

3. Containment

4. Eradication

5. Recovery

6. Post-incident activity: document/Lessons learned

Detection & Analysis Ans: where the action begins to happen in
our incident response process. In this phase, we will detect the
occurrence of an issue and decide whether or not it is actually an
incident, so that we can respond appropriately to it.

Containment Ans: involves taking steps to ensure that the situation
does not cause any more damage than it already has, or to at
least lessen any ongoing harm.

Eradication Ans: attempt to remove the effects of the issue from
our environment.

Recovery Ans: restoring devices or data to pre-incident state
(rebuilding systems, reloading applications, backup media, etc.)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ivie Southern New Hampshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
9 months
Number of followers
1
Documents
8296
Last sold
9 hours ago

3.3

6 reviews

5
2
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions