100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 – Multi/Comprehensive Final Exam Review Questions and Answers (Verified Solutions, 100% Correct, A+ Rated, Newly Passed) Complete and verified exam review material with fully solved questions and answers.

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
03-12-2025
Written in
2025/2026

This document contains a comprehensive set of multi-topic final exam review questions for the WGU C836 Fundamentals of Information Security course, with 100% verified and correct solutions. All answers are A+ rated and aligned with the latest exam standards. The material is designed for thorough preparation and ensures complete coverage of all major concepts and scenarios for optimal exam readiness.

Show more Read less
Institution
WGU C836
Course
WGU C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836
Course
WGU C836

Document information

Uploaded on
December 3, 2025
Number of pages
36
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

logomarks| 54339004




WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW
QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS 100%
CORRECT RATED A+ NEWLY PASSED!!!




Which part(s) of the CIA triad are most commonly impacted by a Fabrication
attack?
A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and Integrity
✅ ANS >>> D. Integrity and Availability


Which aspect(s) of the CIA triad are usually targeted in an Interception
attack?
A. Integrity and Availability
B. Confidentiality and Integrity
C. Availability
D. Integrity
E. Confidentiality
✅ ANS >>> E. Confidentiality


What term refers to something that could potentially harm your assets?
A. Threat
B. Impact
C. Risk
D. Vulnerability
✅ ANS >>> A. Threat

, logomarks| 54339004




What kind of controls are responsible for securing data-processing systems,
networks, and environments?
A. Logical controls
B. Administrative controls
C. Physical controls
✅ ANS >>> A. Logical controls


Which is the first and possibly most critical step in managing risk?
A. Assess risks
B. Mitigate risks
C. Identify threats
D. Assess vulnerabilities
E. Identify assets
✅ ANS >>> E. Identify assets


What is the practice of safeguarding information and systems from
unauthorized actions such as access, alteration, or destruction?
✅ ANS >>> Information security


Which attack method focuses primarily on breaching confidentiality?
✅ ANS >>> Interception


What do we call a potential source of danger to our assets?
✅ ANS >>> Threat


What is defined as a weakness that might be exploited to cause harm?
✅ ANS >>> Vulnerability


What is the chance or possibility that an undesirable event will happen?
✅ ANS >>> Risk

, logomarks| 54339004




What type of attack involves unauthorized changes to data or systems?
✅ ANS >>> Modification attack


Which model expands the CIA triad with additional principles like control,
usefulness, and authenticity?
✅ ANS >>> Pinkerian Hexad


What term refers to the physical control or custody of storage media?
✅ ANS >>> Possession or control


Which type of attack involves generating fake data, signals, or activities
within a system?
✅ ANS >>> Fabrication attack


What strategy uses multiple layers of defense to ensure protection even if one
layer fails?
✅ ANS >>> Defense in depth


What are controls that are also referred to as technical measures and help
safeguard digital data and systems?
✅ ANS >>> Logical controls


What type of security measures protects the actual physical areas where
systems and data are housed?
✅ ANS >>> Physical controls


Which risk management stage includes proactive steps taken before incidents
occur to better handle potential threats?
✅ ANS >>> Preparation phase

, logomarks| 54339004




Which phase focuses on identifying and analyzing issues to determine whether
they are incidents needing response?
✅ ANS >>> Detection and analysis phase


Which biometric trait refers to how stable or resistant it is to changes over
time?
A. Collectability
B. Acceptability
C. Universality
D. Uniqueness
E. Permanence
✅ ANS >>> E. Permanence


Which type of authentication can help protect against man-in-the-middle
attacks?
A. Multifactor
B. Mutual
C. Something you know
D. Something you are
E. Something you do
✅ ANS >>> B. Mutual


What is the term for an authentication method where both parties confirm
each other’s identity?
✅ ANS >>> Mutual authentication


What term describes how easily a biometric system can be tricked using fake
data?
✅ ANS >>> Circumvention


A user who creates a network share and sets permissions on that share is
employing which model of access control? This task contains the radio buttons and

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
techgrades havard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
290
Member since
2 year
Number of followers
101
Documents
11797
Last sold
2 days ago
TECHGRADES

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from TECHGRADES.

Read more Read less
4.0

67 reviews

5
37
4
7
3
15
2
4
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions