100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 QUESTIONS WITH 100% CORRECT ANSWERS

Rating
-
Sold
-
Pages
69
Grade
A+
Uploaded on
29-01-2025
Written in
2024/2025

WGU C836 QUESTIONS WITH 100% CORRECT ANSWERS

Institution
WGU C836
Course
WGU C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836
Course
WGU C836

Document information

Uploaded on
January 29, 2025
Number of pages
69
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

this law improves the efficiency and effectiveness of the health care system and protects
patient privacy


Give this one a try later!


HIPAA (Health Insurance Portability and Accountability Act)

,a security method that involves shifting the contents of memory around to make
tampering difficult


Give this one a try later!


ASLR (Address Space Layout Randomization)




An attack that involves generating data, processes, communications, or other similar
activities with a system;
- affects primarily integrity and availability


Give this one a try later!


fabrication attack




a set of methods we use to establish a claim of identity as being true
corroborates the identity of an entity, whether it is the sender, the sender's computer,
some device, or some information


Give this one a try later!


authentication




a measure of the differences of a particular characteristic among a group of individuals

,Give this one a try later!


uniqueness




The risk management phase where we determine specifically what happened, why it
happened, and what we can do to keep it from happening again


Give this one a try later!


post-incident activity phase




Name 3 examples of exploit frameworks


Give this one a try later!


Metasploit, Immunity CANVAS, Core Impact




Uses one or more authentication methods for access


Give this one a try later!


multifactor authentication

, The 1st Law of Haas' Laws of Operations Security


Give this one a try later!


If you don't know the threat, how do you know what to protect?




A password is an example of this type of factor


Give this one a try later!


something you know




created to link a public key to a particular individual;
used as a form of electronic identification for that person


Give this one a try later!


certificate




A combination of DAC and MAC, primarily concerned with the confidentiality of the
resource.
- 2 security properties define how information can flow to and from the resource: the
simple security property and the * property


Give this one a try later!
CA$14.10
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestITandFixIT Johns Hopkins University
Follow You need to be logged in order to follow users or courses
Sold
34
Member since
11 months
Number of followers
0
Documents
4730
Last sold
1 week ago

3.3

6 reviews

5
3
4
0
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions