12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
Science Computer Science Computer Security and Reliability
WGU Course C836 - Fundamentals of Information Security
Quizlet by Brian MacFarlane exam with question and
answer 100%correct
C
Terms in this set (200)
Which cybersecurity term is D
defined as the potential for an
attack on a resource?
A Impact
B Vulnerability
C Risk
D Threat
Which security type deliberately C
exposes a system's
vulnerabilities or resources to an
attacker?
A Intrusion detection
B Firewalls
C Honeypots
D Intrusion prevention
Which tool can be used to map C
devices on a network, along
with their operating system
types and versions?
A Packet sniffer
B Packet filter
C Port scanner
D Stateful firewall
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 1/44
,12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
Which web attack is a server- C
side attack?
A Clickjacking
B Cross-site scripting
C SQL injection
D Cross-site request forgery
An organization employs a VPN A
to safeguard its information.
Which security principle is
protected by a VPN?
A Data in motion
B Data at rest
C Data in use
D Data in storage
A malicious hacker was D
successful in a denial of service
(DoS) attack against an
institution's mail server.
Fortunately, no data was lost or
altered while the server was
offline.
Which type of attack is this?
A Modification
B Fabrication
C Interception
D Interruption
A company has had several D
successful denial of service
(DoS) attacks on its email server.
Which security principle is being
attacked?
A Possession
B Integrity
C Confidentiality
D Availability
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 2/44
,12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
A new start-up company has D
started working on a social
networking website. The
company has moved all its
source code to a cloud provider
and wants to protect this source
code from unauthorized access.
Which cyber defense concept
should the start-up company
use to maintain the
confidentiality of its source
code?
A Alarm systems
B Account permissions
C Antivirus software
D File encryption
A company has an annual audit D
of installed software and data
storage systems. During the
audit, the auditor asks how the
company's most critical data is
used. This determination helps
the auditor ensure that the
proper defense mechanisms are
in place to protect critical data.
Which principle of the Parkerian
hexad is the auditor addressing?
A Possession
B Integrity
C Authenticity
D Utility
Which web attack is possible C
due to a lack of input validation?
A Extraneous files
B Clickjacking
C SQL injection
D Cross-site request forgery
Which file action implements the D
principle of confidentiality from
the CIA triad?
A Compression
B Hash
C Backup
D Encryption
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 3/44
, 12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
Which cyber defense concept D
suggests limiting permissions to
only what is necessary to
perform a particular task?
A Authentication
B Authorization
C Defense in depth
D Principle of least privilege
A company institutes a new B
policy that "All office computer
monitors must face toward
employees and must face away
from doorways. The monitor
screens must not be visible to
people visiting the office."
Which principle of the CIA triad
is this company applying?
A Availability
B Confidentiality
C Utility
D Integrity
At a small company, an C
employee makes an
unauthorized data alteration.
Which component of the CIA
triad has been compromised?
A Confidentiality
B Authenticity
C Integrity
D Availability
An organization plans to A
encrypt data in transit on a
network.
Which aspect of data is the
organization attempting to
protect?
A Integrity
B Possession
C Availability
D Authenticity
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 4/44
Science Computer Science Computer Security and Reliability
WGU Course C836 - Fundamentals of Information Security
Quizlet by Brian MacFarlane exam with question and
answer 100%correct
C
Terms in this set (200)
Which cybersecurity term is D
defined as the potential for an
attack on a resource?
A Impact
B Vulnerability
C Risk
D Threat
Which security type deliberately C
exposes a system's
vulnerabilities or resources to an
attacker?
A Intrusion detection
B Firewalls
C Honeypots
D Intrusion prevention
Which tool can be used to map C
devices on a network, along
with their operating system
types and versions?
A Packet sniffer
B Packet filter
C Port scanner
D Stateful firewall
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 1/44
,12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
Which web attack is a server- C
side attack?
A Clickjacking
B Cross-site scripting
C SQL injection
D Cross-site request forgery
An organization employs a VPN A
to safeguard its information.
Which security principle is
protected by a VPN?
A Data in motion
B Data at rest
C Data in use
D Data in storage
A malicious hacker was D
successful in a denial of service
(DoS) attack against an
institution's mail server.
Fortunately, no data was lost or
altered while the server was
offline.
Which type of attack is this?
A Modification
B Fabrication
C Interception
D Interruption
A company has had several D
successful denial of service
(DoS) attacks on its email server.
Which security principle is being
attacked?
A Possession
B Integrity
C Confidentiality
D Availability
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 2/44
,12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
A new start-up company has D
started working on a social
networking website. The
company has moved all its
source code to a cloud provider
and wants to protect this source
code from unauthorized access.
Which cyber defense concept
should the start-up company
use to maintain the
confidentiality of its source
code?
A Alarm systems
B Account permissions
C Antivirus software
D File encryption
A company has an annual audit D
of installed software and data
storage systems. During the
audit, the auditor asks how the
company's most critical data is
used. This determination helps
the auditor ensure that the
proper defense mechanisms are
in place to protect critical data.
Which principle of the Parkerian
hexad is the auditor addressing?
A Possession
B Integrity
C Authenticity
D Utility
Which web attack is possible C
due to a lack of input validation?
A Extraneous files
B Clickjacking
C SQL injection
D Cross-site request forgery
Which file action implements the D
principle of confidentiality from
the CIA triad?
A Compression
B Hash
C Backup
D Encryption
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 3/44
, 12/14/25, 5:50 PM WGU Course C836 - Fundamentals of Information Security Quizlet by Brian MacFarlane Flashcards | Quizlet
Which cyber defense concept D
suggests limiting permissions to
only what is necessary to
perform a particular task?
A Authentication
B Authorization
C Defense in depth
D Principle of least privilege
A company institutes a new B
policy that "All office computer
monitors must face toward
employees and must face away
from doorways. The monitor
screens must not be visible to
people visiting the office."
Which principle of the CIA triad
is this company applying?
A Availability
B Confidentiality
C Utility
D Integrity
At a small company, an C
employee makes an
unauthorized data alteration.
Which component of the CIA
triad has been compromised?
A Confidentiality
B Authenticity
C Integrity
D Availability
An organization plans to A
encrypt data in transit on a
network.
Which aspect of data is the
organization attempting to
protect?
A Integrity
B Possession
C Availability
D Authenticity
https://quizlet.com/426738149/wgu-course-c836-fundamentals-of-information-security-quizlet-by-brian-macfarlane-flash-cards/ 4/44