100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Otro

WGU C836 OA Study Guide (Overly Informative) – Exam Preparation Material (A+ Graded, Latest Update) Extensive and highly detailed study guide with fully solved content.

Puntuación
-
Vendido
-
Páginas
33
Subido en
03-12-2025
Escrito en
2025/2026

This document provides an overly informative and highly detailed study guide for the WGU C836 OA, including A+ graded exam-level explanations. It covers all major information security principles, domains, and scenarios aligned with the most recent version of the assessment. The material is structured for deep understanding and complete exam readiness.

Mostrar más Leer menos
Institución
WGU C836
Grado
WGU C836











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C836
Grado
WGU C836

Información del documento

Subido en
3 de diciembre de 2025
Número de páginas
33
Escrito en
2025/2026
Tipo
Otro
Personaje
Desconocido

Vista previa del contenido

WGU C836 OA STUDY GUIDE (OVERLY INFORMATIVE) EXAM
GRADED A+ LATEST UPDATE.




CIA Triad ANS >>> Confidentiality, Integrity, Availability


Pinkerian hexad ANS >>> Where the CIA triad consists of
confidentiality, integrity, and availability, the Pinkerian hexad
consists of these three principles, as well as possession or
control, authenticity, and utility


Confidentiality ANS >>> Refers to our ability to protect our data
from those who are not authorized to view it.


Confidentiality can be compromised by the loss of a laptop
containing data, a person looking over our shoulder while we
type a password, an e-mail attachment being sent to the wrong
person, an attacker penetrating our systems, or similar issues.

,Integrity ANS >>> Refers to the ability to prevent our data from
being changed in an unauthorized or undesirable manner. This
could mean the unauthorized change or deletion of our data or
portions of our data, or it could mean an authorized, but
undesirable, change or deletion of our data. To maintain
integrity, we not only need to have the means to prevent
unauthorized changes to our data but also need the ability to
reverse authorized changes that need to be undone.


Availability ANS >>> refers to the ability to access our data when
we need it. Loss of availability can refer to a wide variety of
breaks anywhere in the chain that allows us access to our data.
Such issues can result from power loss, operating system or
application problems, network attacks, compromise of a
system, or other problems. When such issues are caused by an
outside party, such as an attacker, they are commonly referred
to as a denial of service (DoS) attack.


Possession or Control ANS >>> Refers to the physical disposition of
the media on which the data is stored. This enables us, without
involving other factors such as availability, to discuss our loss of
the data in its physical medium


An example is data store be on multiple devices and there could
be numerous versions.

,Authenticity ANS >>> Attribution as to the owner or creator of the
data in question.


Authenticity can be enforced through the use of digital
signatures.


Utility ANS >>> Refers to how useful the data is to us.


Interception ANS >>> Interception attacks allow unauthorized
users to access our data, applications, or environments and are
primarily an attack against confidentiality. Interception might
take the form of unauthorized file viewing or copying,
eavesdropping on phone conversations, or reading e-mail, and
can be conducted against data at rest or in motion. Properly
executed, interception attacks can be very difficult to detect.


Affects Confidentiality


Interruption ANS >>> Interruption attacks cause our assets to
become unusable or unavailable for our use, on a temporary or
permanent basis. Interruption attacks often affect availability
but can be an attack on integrity as well. In the case of a DoS

, attack on a mail server, we would classify this as an availability
attack.


Affects Integrity and availability


Modification ANS >>> Modification attacks involve tampering with
our asset. If we access a file in an unauthorized manner and
alter the data it contains, we have affected the integrity of the
data contained in the file.


Fabrication ANS >>> Fabrication attacks involve generating data,
processes, communications, or other similar activities with a
system. Fabrication attacks primarily affect integrity but could
be considered an availability attack as well. If we generate
spurious information in a database, this would be considered to
be a fabrication attack.


Affects Integrity and Availability


Threat ANS >>> Something that has potential to cause harm


Vulnerability ANS >>> Weaknesses that can be used to harm us

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
techgrades havard university
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
290
Miembro desde
2 año
Número de seguidores
101
Documentos
11797
Última venta
2 días hace
TECHGRADES

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from TECHGRADES.

Lee mas Leer menos
4.0

67 reseñas

5
37
4
7
3
15
2
4
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes