Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 OA Study Guide (Overly Informative) questions with complete solutions

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
31-03-2026
Written in
2025/2026

WGU C836 OA Study Guide (Overly Informative) questions with complete solutions

Institution
WGU
Module
WGU

Content preview

WGU C836 OA Study Guide (Overly
Informative) questions and answers
2026\2027A+ Grade




This exam contains :

 WGU C836 OA Study Study guide



 Overly Informative)



 questions and answers A+ Grade

,CIA Triad
- correct answer Confidentiality, Integrity, Availability



Parkerian hexad
- correct answer Where the CIA triad consists of confidentiality, integrity, and availability, the
Parkerian hexad consists of these three principles, as well as possession or control, authenticity,
and utility



Confidentiality
- correct answer Refers to our ability to protect our data from those who are not authorized to view
it.



Confidentiality can be compromised by the loss of a laptop containing data, a person looking over
our shoulder while we type a password, an e-mail attachment being sent to the wrong person, an
attacker penetrating our systems, or similar issues.



Integrity
- correct answer Refers to the ability to prevent our data from being changed in an unauthorized or
undesirable manner. This could mean the unauthorized change or deletion of our data or portions of
our data, or it could mean an authorized, but undesirable, change or deletion of our data. To
maintain integrity, we not only need to have the means to prevent unauthorized changes to our data
but also need the ability to reverse authorized changes that need to be undone.



Availability
- correct answer refers to the ability to access our data when we need it. Loss of availability can
refer to a wide variety of breaks anywhere in the chain that allows us access to our data. Such
issues can result from power loss, operating system or application problems, network attacks,
compromise of a system,

, or other problems. When such issues are caused by an outside party, such as an attacker, they are
commonly referred to as a denial of service (DoS) attack.



Possession or Control
- correct answer Refers to the physical disposition of the media on which the data is stored. This
enables us, without involving other factors such as availability, to discuss our loss of the data in its
physical medium



An example is data store be on multiple devices and there could be numerous versions.



Authenticity
- correct answer Attribution as to the owner or creator of the data in question.



Authenticity can be enforced through the use of digital signatures.



Utility
- correct answer Refers to how useful the data is to us.



Interception
- correct answer Interception attacks allow unauthorized users to access our data, applications, or
environments and are primarily an attack against confidentiality. Interception might take the form of
unauthorized file viewing or copying, eavesdropping on phone conversations, or reading e-mail, and
can be conducted against data at rest or in motion. Properly executed, interception attacks can be
very difficult to detect.



Affects Confidentiality



Interruption
- correct answer Interruption attacks cause our assets to become unusable or unavailable for our use,
on a temporary or permanent basis. Interruption attacks often affect availability but can be an attack
on integrity as well. In the case of a DoS attack on a mail server, we would classify this as an
availability attack.



Affects Integrity and availability

Document information

Uploaded on
March 31, 2026
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers
$16.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUIVERS Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
154
Member since
1 year
Number of followers
9
Documents
1023
Last sold
2 days ago
QUIVERS STUDY GUIDES........

On this Quivers : I have Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology And All Other Subjects Test Bank & Solutions Welcome to your preferred digital nursing and medical resource bank I know how frustrating it is to get precise, solid, and up-to-date study documents to revise and prepare for exams and attend to assignments. It is for this simple but overwhelming reason that I set up a one-stop shop for all your studying needs. Feel free to consult on any study materials and refer me to your friends. WELCOME!!!

Read more Read less
3.9

31 reviews

5
18
4
3
3
5
2
0
1
5

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions