100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

C836 - Fundamentals of Information Security (WGU) Exam Questions With Correct Answers

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
14-12-2025
Written in
2025/2026

C836 - Fundamentals of Information Security (WGU) Exam Questions With Correct Answers

Institution
C836 - Fundamentals Of Information Security
Module
C836 - Fundamentals of Information Security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836 - Fundamentals of Information Security
Module
C836 - Fundamentals of Information Security

Document information

Uploaded on
December 14, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

12/14/25, 4:42 PM C836 - Fundamentals of Information Security (WGU) Flashcards | Quizlet

Science Computer Science Computer Security and Reliability




C836 - Fundamentals of
Information Security (WGU)
Exam Questions With Correct
Answers

]
C




Terms in this set (186)


Protecting an organization's information and information systems
Information Security from unauthorized access, use, disclosure, disruption,
modification, or destruction.

Requirements that are set forth by laws and
Compliance
industry regulations.

CIA Confidentiality, Integrity, Availability

Refers to our ability to protect our data from those who are not
Confidentiality
authorized to use/view it

The ability to prevent people from changing your data in an
Integrity
unauthorized or undesirable manner

Availability Refers to the ability to access our data when we need it

refers to the physical disposition of the media on which the data
Possession/Control is stored. (tape examples where some are encrypted and some
are not)

whether you've attributed the data in question to the proper
Authenticity owner or creator. (altered email that says it's from one person
when it's not - violation of the authenticity of the email)

Utility refers to how useful the data is to you.

interception, interruption, modification, and
Attacks
fabrication

attacks that allow unauthorized users to access your data,
Interception applications, or environments. Are primarily attacks against
confidentiality

attacks that make your assets unusable or unavailable to you
Interruption temporarily or permanently. DoS attack on a mail server, for
example. May also affect integrity




https://quizlet.com/715015910/c836-fundamentals-of-information-security-wgu-flash-cards/ 1/20

,12/14/25, 4:42 PM C836 - Fundamentals of Information Security (WGU) Flashcards | Quizlet

attacks involve tampering with our asset. Such attacks might
Modification primarily be considered an integrity attack but could also
represent an availability attack.

attacks involve generating data, processes, communications, or
other similar activities with a system. Fabrication attacks primarily
Fabrication
affect integrity but could be considered an availability attack as
well.

is the likelihood that an event will occur. To have risk there must
Risk be a
threat and vulnerability.

are any events being man-made, natural or environmental that
Threats
could cause damage to assets.

are a weakness that a threat event or the threat agent can take
Vulnerabilities
advantage of.

takes into account the value of the asset being threatened and
Impact
uses it to calculate risk

Identify assets, identify threats, assess vulnerabilities, assess risks,
Risk Management Process
mitigate risks

Defense in Depth Using multiple layers of security to defend your assets.

are the ways we protect assets. Three different types: physical,
Controls
logical, administrative

environment; physical items that protect assets think locks, doors,
Physical Controls
guards, and, fences or environmental factors (time)

Sometimes called technical controls, these protect the systems,
Logical Controls networks, and environments that process, transmit, and store our
data

based on laws, rules, policies, and procedures, guidelines, and
other items that are "paper" in nature. They are the policies that
Administrative Controls
organizations create for governance. For example, acceptable
use and email use policies.

phase of incident response consists of all of the activities that we
Preparation can perform, in advance of the incident itself, in order to better
enable us to handle it.

1. Preparation
2. Detection and Analysis (Identification)
3. Containment
Incident Response Process
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

where the action begins to happen in our incident response
process. In this phase, we will detect the occurrence of an issue
Detection & Analysis
and decide whether or not it is actually an incident, so that we
can respond appropriately to it.

involves taking steps to ensure that the situation does not cause
Containment any more damage than it already has, or to at least lessen any
ongoing harm.

Eradication attempt to remove the effects of the issue from our environment.



https://quizlet.com/715015910/c836-fundamentals-of-information-security-wgu-flash-cards/ 2/20

, 12/14/25, 4:42 PM C836 - Fundamentals of Information Security (WGU) Flashcards | Quizlet

restoring devices or data to pre-incident state (rebuilding
Recovery
systems, reloading applications, backup media, etc.)

determine specifically what happened, why it happened, and
Post-incident activity
what we can do to keep it from happening again. (postmortem).

Identity who or what we claim to be. Simply an assertion.

the act of providing who or what we claim to be. More
Authentication technically, the set of methods used to establish whether a claim
is true

simply verifies status of ID. For example, showing your driver's
Verification
license at a bar. "Half-step" between identity and authentication

• Something you know: Username/Password/Pin
• Something you have: ID badge/swipe card/OTP
Five Different Types of
• Something you are: Fingerprint/Iris/Retina scan
Authentication
• Somewhere you are: Geolocation
• Something you do: Handwriting/typing/walking

Single-factor authentication only using one type of authentication

using two different factors of authentication (2 of the same factor
Dual-factor authentication
does not count )

Use of several (more than two) authentication techniques
Multi-factor authentication together, such as passwords and security tokens, and
geolocation.

process where the session is
Mutual Authentication
authenticated on both ends and just one end.

Mutual authentication prevents man-in-the-middle attacks
what kind of attacks?

Using a password for access is Something you know
what kind of authentication

An iris-scan for access is what Something you are
kind of authentication

Using a security key-fob for Something you have
access is what kind of
authentication

Using biometrics are what kind Something you are
of authentication

For biometric authentication one universality, permanence, collectibility, performance,
must consider acceptability, and circumvention

The level of authorization what a user can access, modify, and delete
dictates

The process of determining exactly what an authenticated party
Authorization
can do

The principle that you should only give a party the bare minimum
Principle of Least Privilege
level of access it needs to perform its job/functionality

tools and systems used to allow or deny access, limit access, or
Access Controls are
revoke access

Access controls can be based physical attributes, sets of rules, lists of individuals or systems, or
on other, more complex factors


https://quizlet.com/715015910/c836-fundamentals-of-information-security-wgu-flash-cards/ 3/20
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Cleverman

Get to know the seller

Seller avatar
Cleverman NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 months
Number of followers
0
Documents
646
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions