100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C706 STUDY GUIDE EXAM QUESTIONS AND ANSWERS. VERIFIED 2025/2026.

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
09-12-2025
Written in
2025/2026

WGU C706 STUDY GUIDE EXAM QUESTIONS AND ANSWERS. VERIFIED 2025/2026.

Institution
WGU C706
Module
WGU C706










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C706
Module
WGU C706

Document information

Uploaded on
December 9, 2025
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C706 STUDY GUIDE EXAM
QUESTIONS AND ANSWERS. VERIFIED
2025/2026.




Confidentiality - ANS In information security, confidentiality "is the property, that information
is not made available or disclosed to unauthorized individuals, entities, or processes"



Integrity - ANS In information security, data integrity means maintaining and assuring the
accuracy and completeness of data over its entire life-cycle. This means that data cannot be
modified in an unauthorized or undetected manner. This can be also used to validate databases
to make sure none of the data is corrupt or modified in an unauthorized matter.



Availability - ANS For any information system to serve its purpose, the information must be
available when it is needed. This means that the computing systems used to store and process
the information, the security controls used to protect it, and the communication channels used
to access it must be functioning correctly.



CIA Triad - ANS Confidentiality, Integrity, Availability



Secure Software Design Feature - ANS Confidentiality: Public Key Infrastructure (PKI) and
Cryptography/Encryption



Availability: Offsite back-up and Redundancy

1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

,Integrity: Hashing, Message Digest (MD5), non repudiation and digital signatures



Software Architect - ANS The software architect moves analysis to implementation and
analyzes the requirements and use cases as activities to perform as part of the development
process. That person can also develop class diagrams.



Security Practitioner Roles - ANS Release Manager

Architect

Developer

Business Analyst/Project Manager



Release Manager - ANS Deployment



Architect - ANS Design



Developer - ANS Coding



Business Analyst/Project Manager - ANS Requirements Gathering



Confidentiality - ANS Public Key Infrastructure (PKI) and Cryptography/Encryption



Availability - ANS Offsite back-up and Redundancy



Integrity - ANS Hashing, Message Digest (MD5), non repudiation and digital signatures



2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

, Red Team - ANS These are teams of people familiar with the infrastructure of the company
and the languages of the software being developed. Their mission is to kill the system as the
developers build it.



Static Analysis - ANS Static analysis, also called static code analysis, is a method of computer
program debugging that is done by examining the code without executing the program. The
process provides an understanding of the code structure, and can help to ensure that the code
adheres to industry standards. It's also referred as code review.



MD5 Hash - ANS The MD5 algorithm is a widely used hash function producing a 128-bit hash
value. Although MD5 was initially designed to be used as a cryptographic hash function, it has
been found to suffer from extensive vulnerabilities. It can still be used as a checksum to verify
data integrity, but only against unintentional corruption. (Integrity)



SHA-256 - ANS The SHA (Secure Hash Algorithm) is one of a number of cryptographic hash
functions. A cryptographic hash is like a signature for a text or a data file. SHA-256 algorithm
generates an almost-unique, fixed size 256-bit (32-byte) hash. Hash is a one-way function - it
cannot be decrypted back. (Integrity)



Advanced Encryption Standard (AES) - ANS AES (acronym of Advanced Encryption Standard)
is a symmetric encryption algorithm. The algorithm was developed by two Belgian
cryptographer Joan Daemen and Vincent Rijmen. AES was

designed to be efficient in both hardware and software, and supports a block length of 128 bits
and key lengths of 128, 192, and 256 bits. (Confidentiality)



Stochastic - ANS The analogy between safety and security is particularly close. The main
difference is that safety-relevant faults are stochastic (i.e., unintentional or accidental), whereas
security-relevant faults are "sponsored," i.e., intentionally created and activated through
conscious and intentional human agency.




3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
sirjoel Liberty University
View profile
Follow You need to be logged in order to follow users or courses
Sold
104
Member since
1 year
Number of followers
13
Documents
11875
Last sold
17 hours ago
Sirjoel

Here you will find all documents and package deals offered by sirjoel

3.4

16 reviews

5
3
4
4
3
7
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions