100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 – Fundamentals of Information Security Exam (A+ Graded, 100% Guaranteed Success) Complete exam prep material with fully solved, high-quality answers.

Rating
-
Sold
-
Pages
46
Grade
A+
Uploaded on
03-12-2025
Written in
2025/2026

This document provides fully updated exam material for the WGU C836 Fundamentals of Information Security course, including detailed A+ graded answers. It covers all major security principles, domains, and scenarios featured in the latest exam version. The content is structured for efficient studying and offers comprehensive support across the full scope of required knowledge.

Show more Read less
Institution
WGU C836
Course
WGU C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836
Course
WGU C836

Document information

Uploaded on
December 3, 2025
Number of pages
46
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY EXAM
GRADED A+ 100% GUARANTEED SUCCESS.




Information Security ANS >>> Protecting an organization's information
and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.


Compliance ANS >>> Requirements that are set forth by laws and
industry regulations.


CIA ANS >>> Confidentiality, Integrity, Availability


Confidentiality ANS >>> Refers to our ability to protect our data from
those who are not authorized to use/view it


Integrity ANS >>> The ability to prevent people from changing your data
in an unauthorized or undesirable manner


Availability ANS >>> Refers to the ability to access our data when we need
it

,Possession/Control ANS >>> refers to the physical disposition of the media
on which the data is stored. (tape examples where some are encrypted
and some are not)


Authenticity ANS >>> whether you've attributed the data in question to
the proper owner or creator. (altered email that says it's from one
person when it's not - violation of the authenticity of the email)


Utility ANS >>> refers to how useful the data is to you.


Attacks ANS >>> interception, interruption, modification, and
fabrication


Interception ANS >>> attacks that allow unauthorized users to access your
data, applications, or environments. Are primarily attacks against
confidentiality


Interruption ANS >>> attacks that make your assets unusable or
unavailable to you temporarily or permanently. DoS attack on a mail
server, for example. May also affect integrity


Modification ANS >>> attacks involve tampering with our asset. Such
attacks might primarily be considered an integrity attack but could also
represent an availability attack.

,Fabrication ANS >>> attacks involve generating data, processes,
communications, or other similar activities with a system. Fabrication
attacks primarily affect integrity but could be considered an availability
attack as well.


Risk ANS >>> is the likelihood that an event will occur. To have risk there
must be a
threat and vulnerability.


Threats ANS >>> are any events being man-made, natural or
environmental that could cause damage to assets.


Vulnerabilities ANS >>> are a weakness that a threat event or the threat
agent can take advantage of.


Impact ANS >>> takes into account the value of the asset being
threatened and uses it to calculate risk


Risk Management Process ANS >>> Identify assets, identify threats, assess
vulnerabilities, assess risks, mitigate risks


Défense in Depth ANS >>> Using multiple layers of security to defend your
assets.

, Controls ANS >>> are the ways we protect assets. Three different types:
physical, logical, administrative


Physical Controls ANS >>> environment; physical items that protect assets
think locks, doors, guards, and, fences or environmental factors (time)


Logical Controls ANS >>> Sometimes called technical controls, these
protect the systems, networks, and environments that process,
transmit, and store our data


Administrative Controls ANS >>> based on laws, rules, policies, and
procedures, guidelines, and other items that are "paper" in nature.
They are the policies that organizations create for governance. For
example, acceptable use and email use policies.


Preparation ANS >>> phase of incident response consists of all of the
activities that we can perform, in advance of the incident itself, in order
to better enable us to handle it.


Incident Response Process ANS >>> 1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
techgrades havard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
290
Member since
2 year
Number of followers
101
Documents
11797
Last sold
2 days ago
TECHGRADES

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from TECHGRADES.

Read more Read less
4.0

67 reviews

5
37
4
7
3
15
2
4
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions