100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Fundamentals of Information Security EXAM QUESTIONS WITH ANSWERS

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
03-09-2025
Written in
2025/2026

WGU C836 Fundamentals of Information Security EXAM QUESTIONS WITH ANSWERS












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
September 3, 2025
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836 Fundamentals of Information |\ |\ |\ |\ |\




Security EXAM QUESTIONS WITH |\ |\ |\ |\




ANSWERS

Define the confidentiality, integrity, availability (CIA) triad.
|\ |\ |\ |\ |\ |\




the core model of all of information security
|\ |\ |\ |\ |\ |\ |\




Differentiate confidentiality, integrity, and availability. |\ |\ |\ |\




Confidential is allowing only those authorized to access the data requested.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



Integrity is keeping data unaltered by Accidental or Malicious intent.
|\ |\ |\ |\ |\ |\ |\ |\ |\



Availability is the ability to access data when needed.
|\ |\ |\ |\ |\ |\ |\ |\




Define information security.
|\ |\




keeping data, software, and hardware secure against unauthorized access,
|\ |\ |\ |\ |\ |\ |\ |\ |\



use, disclosure, disruption, modification, or destruction
|\ |\ |\ |\ |\




Assets should always be protected by value to the organization in this order:
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




Most important: people, data
|\ |\ |\



Least important: hardware/software
|\ |\




Define the Parkerian Hexad and its principles.
|\ |\ |\ |\ |\ |\




CIA triad plus:
|\ |\



Possession/Control: the physical disposition of the media on which the data |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



is stored.
|\



Authenticity: allows us to talk about the proper attribution as to the owner
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



or creator of the data in question.
|\ |\ |\ |\ |\ |\



Utility: how useful the data is to us.
|\ |\ |\ |\ |\ |\ |\




Identify the four types of attacks.
|\ |\ |\ |\ |\

,Interception: allow unauthorized users to access our data, applications, or
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



environments.
Interruption: cause our assets to become unusable or unavailable for our use,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



on a temporary or permanent basis.
|\ |\ |\ |\ |\ |\



Modification: involve tampering with our asset. |\ |\ |\ |\ |\



Fabrication: involve generating data, processes, communications, or other
|\ |\ |\ |\ |\ |\ |\ |\



similar activities with a system.
|\ |\ |\ |\




Compare threats, vulnerabilities, risk, and impact.
|\ |\ |\ |\ |\




Risk: the likelihood that an event will occur. To have risk there must be a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



threat and vulnerability.
|\ |\



Threats: any events being man-made, natural or environmental that could
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



cause damage to assets.
|\ |\ |\



Vulnerabilities: a weakness that a threat event or the threat agent can take
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



advantage of. |\



Impact: an additional step that is taking into account the asset's cost.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\




Define the risk management process and its stages.
|\ |\ |\ |\ |\ |\ |\




Identify assets |\



Identify threats |\



Assess vulnerabilities|\



Assess risks |\



Mitigating risks |\




Define the incident response process.
|\ |\ |\ |\




the 6 step response cycle when risk management practices have failed and
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



have caused an inconvenience to a disastrous event.
|\ |\ |\ |\ |\ |\ |\




Define the incident response process stages.
|\ |\ |\ |\ |\




Preparation
Detection and analysis |\ |\



Containment
Eradication

,Recovery
Post incident activity (postmortem)
|\ |\ |\



(Pole DAncing Cats Eyeballed Rabid Porcupines)
|\ |\ |\ |\ |\




Define defense in depth. |\ |\ |\




layering multiple controls on top on one another.
|\ |\ |\ |\ |\ |\ |\




(Example: Using the 3 control types in multiple overlapping protections.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\



Locks on hardware server cabinets, multilayers of authentication and policies
|\ |\ |\ |\ |\ |\ |\ |\ |\



that control visitors in the building.)
|\ |\ |\ |\ |\ |\




Define compliance, including regulatory and industry compliance.
|\ |\ |\ |\ |\ |\




requirements that are set forth by laws and industry regulations
|\ |\ |\ |\ |\ |\ |\ |\ |\



(HIPPA/HITECH, PCI-DSS, FISMA)
|\ |\ |\




Identify types of controls to mitigate risk.
|\ |\ |\ |\ |\ |\




Physical: physical items that protect assets think locks, doors, guards, and,
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



fences.
Technical/Logical: devices and software that protect assets think firewalls, |\ |\ |\ |\ |\ |\ |\ |\ |\



AV, IDS, and IPS.
|\ |\ |\



Administrative: policies that organizations create for governance an example |\ |\ |\ |\ |\ |\ |\ |\ |\



acceptable use and email use policies. |\ |\ |\ |\ |\




Identify the layers of a defense-in-depth strategy.
|\ |\ |\ |\ |\ |\




Data
Application
Host
Internal Network |\



External Network |\



(Network Perimeter) |\




Identify the defensive measures in the external network layer of the defense-
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



in-depth strategy. |\

, DMZ
VPN
Logging
Auditing
Penetration testing
|\



Vulnerability analysis |\




Identify the defensive measures in the network perimeter layer of the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



defense-in-depth strategy. |\




Firewalls
Proxy
Logging
Stateful packet inspection
|\ |\



Auditing
Penetration testing
|\



Vulnerability analysis |\




Identify the defensive measures in the internal network layer of the defense-
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



in-depth strategy.
|\




IDS
IPS
Logging
Auditing
Penetration testing
|\



Vulnerability analysis |\




Identify the defensive measures in the host layer of the defense-in-depth
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\



strategy.

Authentication
Antivirus
Firewalls
IDS

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
301
Member since
3 year
Number of followers
107
Documents
17723
Last sold
1 week ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

230 reviews

5
155
4
50
3
13
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions