100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 INFORMATION SECURITY Exam Guide Review Rated 100% Passed

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
27-07-2023
Written in
2022/2023

WGU C836 INFORMATION SECURITY Exam Guide Review Rated 100% Passed bounds checking *** to set a limit on the amount of data we expect to receive to set aside storage for that data *required in most programming languages * prevents buffer overflows race conditions *** A type of software development vulnerability that occurs when multiple processes or multiple threads within a process control or share access to a particular resource, and the correct handling of that resource depends on the proper ordering or timing of transactions input validation *** a type of attack that can occur when we fail to validate the input to our applications or take steps to filter out unexpected or undesirable content format string attack *** a type of input validation attacks in which certain print functions within a programming language can be used to manipulate or view the internal memory of an application authentication attack *** A type of attack that can occur when we fail to use strong authentication mechanisms for our applications authorization attack *** A type of attack that can occur when we fail to use authorization best practices for our applications cryptographic attack *** A type of attack that can occur when we fail to properly design our security mechanisms when implementing cryptographic controls in our applications client-side attack *** A type of attack that takes advantage of weaknesses in the software loaded on client machines or one that uses social engineering techniques to trick us into going along with the attack XSS (Cross Site Scripting) *** an attack carried out by placing code in the form of a scripting language into a web page or other media that is interpreted by a client browser XSRF (cross-site request forgery) *** an attack in which the attacker places a link on a web page in such a way that it will be automatically executed to initiate a particular activity on another web page or application where the user is currently authenticated clickjacking *** An attack that takes advantage of the graphical display capabilities of our browser to trick us into clicking on something we might not otherwise server-side attack *** A type of attack on the web server that can target vulnerabilities such as lack of input validation, improper or inadequate permissions, or extraneous files left on the server from the development process Protocol issues, unauthenticated access, arbitrary code execution, and privilege escalation *** Name the 4 main categories of database security issues web application analysis tool *** A type of tool that analyzes web pages or web-based applications and searches for common flaws such as XSS or SQL injection flaws, and improperly set permissions, extraneous files, outdated software versions, and many more such items protocol issues *** unauthenticated flaws in network protocols, authenticated flaws in network protocols, flaws in authentication protocols arbitrary code execution *** An attack that exploits an applications vulnerability into allowing the attacker to execute commands on a user's computer. * arbitrary code execution in intrinsic or securable SQL elements Privilege Escalation *** An attack that exploits a vulnerability in software to gain access to resources that the user normally would be restricted from accessing. * via SQL injection or local issues validating user inputs *** a security best practice for all software * the most effective way of mitigating SQL injection attacks Nikto (and Wikto) *** A web server analysis tool that performs checks for many common server-side vulnerabilities & creates an index of all the files and directories it can see on the target web server (a process known as spidering) burp suite *** A well-known GUI web analysis tool that offers a free and professional version; the pro version includes advanced tools for conducting more in-depth attacks fuzzer *** A type of tool that works by bombarding our applications with all manner of data and inputs from a wide variety of sources, in the hope that we can cause the application to fail or to perform in unexpected ways MiniFuzz File Fuzzer *** A tool developed by Microsoft to find flaws in file-handling source code BinScope Binary Analyzer *** A tool developed by Microsoft to examine source code for general good practices SDL Regex Fuzzer *** A tool developed by Microsoft for testing certain pattern-matching expressions for potential vulnerabilities good sources of secure coding guidelines *** CERT, NIST 800, BSI, an organization's internal coding guidelines OS hardening *** the process of reducing the number of available avenues through which our OS might be attacked attack surface *** The total of the areas through which our operating system might be attacked 6 main hardening categories *** 1. Removing unnecessary software 2. Removing or turning off unessential services 3. Making alterations to common accounts 4. Applying the principle of least privilege 5. Applying software updates in a timely manner 6. Making use of logging and auditing functions Principle of Least Privilege *** states we should only allow a party the absolute minimum permission needed for it to carry out its function stuxnet *** A particularly complex and impactful item of malware that targeted the Supervisory Control and Data Acquisition (SCADA) systems that run various industrial processes; this piece of malware raised the bar for malware from largely being a virtual-based attack to actually being physically destructive anti-malware tool *** A type of tool that uses signature matching or anomaly detection (heuristics) to detect malware threats, either in real-time or by performing scans of files and processes heuristics *** the process of anomaly detection used by anti-malware tools to detect malware without signatures executable space protection *** A hardware and software-based technology that prevents certain portions of the memory used by the operating system and applications from being used to execute code buffer overflow (overrun) *** The act of inputting more data than an application is expecting from a particular input, creating the possibility of executing commands by specifically crafting the excess data ASLR (Address Space Layout Randomization) *** a security method that involves shifting the contents of memory around to make tampering difficult software firewall *** This type of firewall generally contains a subset of the features on a large firewall appliance but is often capable of similar packet filtering and stateful packet inspection activities HIDS (host-based intrusion detection system) *** a system used to analyze the activities on or directed at the network interface of a particular host. * may communicate with management device by sending regular beacons scanner *** a type of tool that can detect various security flaws when examining hosts vulnerability assessment tool *** A tool that is aimed specifically at the task of finding and reporting network services on hosts that have known vulnerabilities Nessus *** A well-known vulnerability assessment tool that includes a port scanner exploit framework *** A group of tools that can include network mapping tools, sniffers, and exploits exploits *** small bits of software that take advantage of flaws in software/applications in order to cause them to behave in ways that were not intended by their creators Metasploit, Immunity CANVAS, Core Impact *** Name 3 examples of exploit frameworks security in network design *** This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy network segmentation *** The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet) choke points *** certain points in the network, such as routers, firewalls, or proxies, where we can inspect, filter, and control network traffic redundancy *** a method of security that involves designing a network to always have another route if something fails or loses connection firewall *** a mechanism for maintaining control over the traffic that flows into and out of our networks packet filtering *** A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass SPI (Stateful Packet Inspection) *** a firewall that can watch packets and monitor the traffic from a given connection DPI (Deep Packet Inspection) *** a firewall technology that can analyze the actual content of the traffic that is flowing through proxy server *** a specialized type of firewall that can serve as a choke point, log traffic for later inspection, and provides a layer of security by serving as a single source of requests for the devices behind it DMZ (demilitarized zone) *** a combination of a network design feature and a protective device such as a firewall. Often used for systems that need to be exposed to external networks but are connected to our own network (such as a web server) NIDS (Network intrusion detection system) *** A system that monitors network traffic and alerts for unauthorized activity signature-based IDS *** An IDS that maintains a database of signatures that might signal a particular type of attack and compares incoming traffic to those signatures anomaly-based IDS *** an IDS that takes a baseline of normal network traffic and activity and measures current traffic against this baseline to detect unusual events VPN (Virtual Private Network) *** an encrypted connection between two points SSH (Secure Shell) *** protocol used to secure traffic in a variety of ways, including file transfers and terminal access. uses RSA encryption (asymmetric encryption) BYOD (bring your own device) *** a phrase that refers to an organization's strategy and policies regarding the use of personal vs. corporate devices MDM (mobile device management) *** a solution that manages security elements for mobile devices in the workplace kismet *** a well-known Linux sniffing tool used to detect wireless access points NetStumbler *** A Windows tool used to detect wireless access points nmap *** A well-known port scanner that can also search for hosts on a network, identify the operating systems those hosts are running, detect the version of the services running on any open ports, and more packet sniffer (aka network or protocol analyzer) *** this type of tool can intercept traffic on a network; listens for any traffic that the network interface of our computer or device can see tcpdump (WinDump for Windows) *** classic, command-line sniffing tool that monitors network activities, filters traffic, and more runs on UNIX systems Wireshark *** a graphical interface protocol sniffing tool that is capable of filtering, sorting, & analyzing both wired and wireless traffic - popular troubleshooting tool honeypot *** A type of tool that deliberately displays vulnerabilities or attractive data so it can detect, monitor, and sometimes tamper with the activities of an attacker hping3 *** A tool used to test the security of firewalls and map network topology. - constructs specially crafted ICMP packets to evade measures to hide devices behind firewall - scripting functionality to test firewall/IDS physical security *** A type of security that is concerned with the protection of people, equipment, and data BCP (Business Continuity Plan) *** the plans we put in place to ensure that critical business functions can continue operations in the event of an emergency DRP (Disaster Recovery Plan) *** the plans we put in place in preparation for a potential disaster, and what exactly we will do during and after major categories of physical threats *** extreme temperature, gases, living organisms, projectiles, movement, energy anomalies, people, toxins, smoke, and fire physical security controls *** The devices, systems, people, and other methods we put in place to ensure our security in a physical sense deterrent, detective, preventive *** name the 3 main types of physical controls deterrent controls *** Controls designed to discourage those who might seek to violate our security controls detective controls *** controls designed to detect and report undesirable events that are taking place preventive controls *** Controls designed to physically prevent unauthorized entities from breaching our physical security residual data *** Data that is unintentionally left behind on a storage device Safety, evacuation plans, administrative controls *** Name the 3 main considerations for protecting people availability, residual data, backups *** Name the 3 main considerations for protecting data equipment, facility repair/replacement *** Name the considerations for protecting equipment flash media *** storage media that is least sensitive to temperature, humidity, magnetic fields, and impacts RAID (redundant array of inexpensive disks) *** a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. most common security awareness issues *** protecting data, passwords, social engineering, network usage, malware, the use of personal equipment, clean desk, policy knowledge protecting data *** a security awareness issue that is concerned with the criticality of carefully handling data from the perspectives of compliance, as well as reputation and customer retention passwords *** a security awareness issue that involves educating users of the importance of strong passwords and password handling best practices social engineering *** techniques used by an attacker that rely on the willingness of people to help others pretexting *** A technique involving a fake identity & a believable scenario that elicits the target to give out sensitive information or perform some action which they would not normally do for a stranger phishing *** a social engineering technique that uses electronic communications (email, text, phone calls) to convince a potential victim to give out sensitive information or perform some action spearphishing *** a social engineering techniqe that targets a specific company, organization, or person, and involves knowing specifics about the target to appear valid tailgating (piggybacking) *** a method by which a person follows directly behind another person who authenticates to the physical access control measure, thus allowing the follower to gain access without authenticating network usage *** a security awareness issue that involves educating users about security issues around connecting devices to networks, such as connecting outside devices to the corporate network, and connecting corporate resources to a public network malware *** a security awareness issue that involves educating users about malicious software and how to avoid it use of personal equipment *** security awareness issue that is concerned with protecting a company's assets clean desk policy *** a security awareness issue that requires users to protect sensitive information at all times, even when away from one's desk policy and regulatory knowledge *** a security awareness issue that is necessary to maintain compliance throughout the organization SATE (Security Awareness, Training and Education) *** a program that seeks to make users aware of the risk they are accepting through their current actions and attempts to change their behavior through targeted efforts OPSEC (Operations Security) *** the process we use to protect our information Sun Tzu *** A Chinese military general from 6th century BC who wrote The Art of War, a text that shows early examples of operations security principles Purple Dragon *** The codename of a study conducted to discover the cause of an information leak during the Vietnam War; is now a symbol of OPSEC competitive intelligence *** the process of intelligence gathering and analysis in order to support business decisions 5 steps of the operations security process *** 1.Identification of critical information 2.Analysis of threats 3.Analysis of vulnerabilities 4.Assessment of risks 5.Application of countermeasures If you don't know the threat, how do you know what to protect? *** The 1st Law of Haas' Laws of Operations Security If you don't know what to protect, how do you know you are protecting it? *** The 2nd Law of Haas' Laws of Operations Security If you are not protecting it, the dragon wins! *** The 3rd Law of Haas' Laws of Operations Security cloud computing *** services that are hosted, often over the Internet, for the purposes of delivering easily scaled computing services or resources identification of critical information *** 1st step in the OPSEC process, arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed analysis of threats *** 2nd step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure analysis of vulnerabilities *** 3rd step in the OPSEC process: to look at the weaknesses that can be used to harm us assessment of risks *** 4th step in the OPSEC process: to determine what issues we really need to be concerned about (areas with matching threats and vulnerabilities) appliance of countermeasures *** 5th step in the OPSEC process: to put measures in place to mitigate risks FISMA (Federal Information Security Modernization Act) *** this law provides a framework for ensuring the effectiveness of information security controls in federal government - changed from Management (2002) to Modernization in 2014 HIPAA (Health Insurance Portability and Accountability Act) *** this law improves the efficiency and effectiveness of the health care system and protects patient privacy FERPA (Family Educational Rights and Privacy Act) *** this law protects the privacy of students and their parents SOX (Sarbanes-Oxley Act) *** this law regulates the financial practice and governance of corporations GLBA (Gramm-Leach-Bliley Act) *** this law protects the customers of financial institutions compliance *** relating to an organization's adherence to laws, regulations, and standards regulatory compliance *** Regulations mandated by law usually requiring regular audits and assessments industry compliance *** Regulations or standards designed for specific industries that may impact ability to conduct business (e.g. PCI DSS) privacy *** the state or condition of being free from being observed or disturbed by other people The Federal Privacy Act of 1974 *** This act safeguards privacy through the establishment of procedural and substantive rights in personal data privacy rights *** Rights relating to the protection of an individual's personal information PII (Personally Identifiable Information) *** Information that can be used to identify an individual, and should be protected as sensitive data and monitored for compliance cryptography *** the science of keeping information secure Cryptanalysis *** The science of breaking through the encryption used to create ciphertext cryptology *** The overarching field of study that covers cryptography and cryptanalysis cryptographic algorithm (cipher) *** The specifics of the process used to encrypt plaintext or decrypt ciphertext plaintext (cleartext) *** unencrypted data ciphertext *** encrypted data Caesar cipher *** an ancient cryptographic technique based on transposition; involves shifting each letter of a plaintext message by a certain number of letters (historically 3) ROT13 cipher *** a more recent cipher that uses the same mechanism as the Caesar cipher but moves each letter 13 places forward symmetric key cryptography (private key cryptography) *** uses a single key for both encryption of the plaintext and decryption of the ciphertext block cipher *** A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block stream cipher *** A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time AES (Advanced Encryption Standard) *** A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook (TCB) mode asymmetric key cryptography (public key cryptography) *** this method uses 2 keys, a public key and a private key SSL (secure sockets layer) *** a protocol that uses the RSA algorithm (an asymmetric algorithm) to secure web and email traffic hash function (message digest) *** keyless cryptography that creates a largely unique and fixed-length hash value based on the original mesage hash *** used to determine whether the message has changed; provides integrity (but not confidentiality) digital signature *** a method of securing a message that involves generating a hash and encrypting it using a private key certificate *** created to link a public key to a particular individual; used as a form of electronic identification for that person CA (certificate authority) *** a trusted entity that handles digital certificates PKI (public key infrastructure) *** infrastructure that includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates RA (registration authority) *** An authority in a PKI that verifies the identity of the individual associated with the certificate CRL (Certificate Revocation List) *** a public list that holds all the revoked certifications for a certain period of time data at rest *** Data that is on a storage device of some kind and is not moving data in motion *** Data that is moving over a WAN or LAN, a wireless network, over the internet, or in other ways data at rest *** This type of data is protected using data security (encryption) and physical security data in motion *** This type of data is best protected by protecting the data itself (using SSL, TLS) and protecting the connection (using IPsec VPN, SSL VPN) data in use *** This type of data is the hardest to protect encryption *** a subset of cryptography that refers specifically to the transformation of unencrypted data into its encrypted form decryption *** The process of recovering the plaintext message from the ciphertext authentication *** a set of methods we use to establish a claim of identity as being true corroborates the identity of an entity, whether it is the sender, the sender's computer, some device, or some information ECC (Elliptic Curve Cryptography) *** An asymmetric encryption algorithm that uses smaller key sizes and requires less processing power than many other encryption methods. commonly used in smaller wireless devices accountability *** this provides us with the means to trace activities in our environment back to their source nonrepudiation *** Refers to a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action deterrence *** refers to elements that discourage or prevent misbehavior in our environments IDS (intrusion detection system) *** a monitoring tool that alerts when an attack or other undesirable activity is taking place IPS (Intrusion Prevention System) *** a tool that alarms and takes actions when malicious events occur auditing *** a methodical examination and review that ensures accountability through technical means; ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse logging *** A process that provides a history of the activities that have taken place in the environment monitoring *** a subset of auditing that focuses on observing information about the environment in order to discover undesirable conditions such as failures, resource shortages, security issues, and trends vulnerability assessment *** An activity involving the careful examination of our environment using vulnerability scanning tools in order to discover vulnerabilities penetration testing *** A more active method of finding security holes that includes using the kinds of tools attackers use to mimic an attack on our environment chain of custody *** a record of where evidence was and how it was passed and protected; required by courts for admissibility of records authorization *** enables us to determine what users are allowed to do principle of least privilege *** States that we should allow only the bare minimum access required in order for a given party (person, user account, or process) to perform a needed functionality violation *** the act of doing something that is prohibited by law or rule allowing access *** An act that grants a particular party access to a given resource denying access *** an act that prevents a party from accessing something, such as logging on to a machine or entering the lobby of our building after hours limiting access *** An act that allows some access to a given resource, but only up to a certain point sandbox *** A set of resources devoted to a program, process, or similar entity, outside of which the entity cannot operate revocation *** the ability to remove access from a resource at any point in time ACL (Access Control List) *** typically built to a certain resource, these contain the identifiers of the party allowed to access the resource and what that party is allowed to do capability-based security *** in this method of security, a person's capabilities are oriented around the use of a token that controls their access (e.g. a personal badge) confused deputy problem *** A type of attack that is more common in systems that use ACLs rather than capabilities; - when software has greater permissions than user, the user can trick the software into misusing authority CSRF (Cross Site Request Forgery) *** a type of attack that misuses the authority of the browser on the user's computer clickjacking (user interface redressing) *** client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on in order to execute a command differing from what a user thinks they are performing - takes advantage of some of the page rendering features that are available in newer browsers DAC (Discretionary Access Control) *** access control model in which access is determined by the owner of the resource in question - e.g. network share permissions RBAC (Role Based Access Control) *** access is based on the role the individual is performing - similar to MAC in that access controls are set by an authority responsible for doing so, rather than by the owner of the resource ABAC (attribute-based access control) *** access control model in which access is based on attributes (of a person, a resource, or an environment) subject attributes *** Attributes of a particular individual, such as height resource attributes *** Attributes that relate to a particular resource, such as operating system or application environmental attributes *** Attributes that relate to environmental conditions, such as time of day or length of time Brewer and Nash model *** - Designed to prevent conflicts of interest - commonly used in industries that handle sensitive data - 3 main resources classes are considered in this model: objects, company groups, and conflict classes Bell-LaPadula Model *** A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. - 2 security properties define how information can flow to and from the resource: the simple security property and the * property Biba model *** Primarily concerned with protecting the integrity of data, even at the expense of confidentiality. - 2 security rules: the simple integrity axiom and the * integrity axiom Tailgating *** A method by which a person follows directly behind another person who authenticates to the physical access control measure, thus allowing the follower to gain access without authenticating Physical access controls *** Access controls that regulate movement into and out of building or facilities Multilevel access control model *** An access control model that includes many tiers of security and is used extensively by military and government organizations and those that handle data of a very sensitive nature MAC (Mandatory Access Control) *** Access control model in which access is decided by a group or individual who has the authority to set access on resources identity verification *** Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards identification *** the claim of what someone or something is Falsifying Identification *** Authentication requirements help prevent this crime something you know *** A password is an example of this type of factor something you are *** An iris scan is an example of this type of factor something you have *** A swipe card is an example of this type of factor something you do *** The time delay between your keystrokes is an example of this type of factor where you are *** Being at a specific terminal is an example of this type of factor multifactor authentication *** Uses one or more authentication methods for access mutual authentication *** An authentication mechanism in which both parties authenticate each other -can prevent a man-in-the-middle attack elements of a complex password *** a password that is a combination of uppercase letters, lowercase letters, numbers, and symbols, such as punctuation marks biometrics *** Unique physical characteristics of an individual, such as the color patterns in an iris, fingerprints, or handprints universality *** a stipulation that our chosen biometric characteristic should be present in the majority of people we expect to enroll in the system uniqueness *** a measure of the differences of a particular characteristic among a group of individuals permanence *** how well a particular characteristic resists change over time and with advancing age collectability *** How easy it is to acquire a characteristic that we can later use to authenticate a user performance measurement *** A set of metrics that judge how well a given system functions acceptability *** A measure of how agreeable a particular characteristic is to the users of a system circumvention *** Describes the ease with which a system can be tricked by a falsified biometric identifier FAR (false acceptance rate) *** the rate at which we accept users whom we should actually have rejected FRR (false rejection rate) *** the rate at which we reject legitimate users when we should have accepted them Information Security *** protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction PCI DSS (Payment Card Industry Data Security Standard) *** companies that process credit card payments must comply with this set of standards Confidentiality *** the act of holding information in confidence, not to be released to unauthorized individuals -a necessary component of privacy integrity *** refers to the ability to prevent our data from being changed in an unauthorized or undesirable manner availability *** refers to the ability to access our data when we need it interception *** a type of attack, primarily against confidentiality threat *** something that has the potential to cause harm to our assets vulnerability *** a weakness that can be used to harm us risk *** the likelihood that something bad will happen impact *** involves considering the value of the asset being threatened to assess risk -sometimes added to the threat/vulnerability/risk equation interruption attack *** An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis -primarily affects availability -can affect integrity modification attack *** An attack that involves tampering with our assets -primarily affects integrity -can affect availability Parkerian hexad *** A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity possession/control *** the physical disposition of the media on which the data is stored authenticity *** allows for attribution as to the owner or creator of the data in question utility *** refers to how useful the data is to us fabrication attack *** An attack that involves generating data, processes, communications, or other similar activities with a system; - affects primarily integrity and availability identify assets *** One of the first and most important steps of the risk management process defense in depth *** A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail administrative controls *** based on rules, laws, policies, procedures, guidelines, and other items that are "paper" in nature logical controls (technical controls) *** controls that protect the systems, networks, and environments that process, transmit, and store our data physical controls *** Controls that protect the physical environment in which our systems sit, or where our data is stored mitigating risk *** Involves putting measures in place to help ensure that a given type of threat is accounted for preparation phase *** The risk management phase that consists of all of the activities that we can perform in advance of the incident itself, in order to better enable us to handle it detection and analysis phase *** The risk management phase where we detect the occurrence of an issue and decide whether it is actually an incident so that we can respond to it appropriately post-incident activity phase *** The risk management phase where we determine specifically what happened, why it happened, and what we can do to keep it from happening again eradication *** to completely remove the effects of the issue from our environment containment *** taking steps to ensure that the situation does not cause any more damage than it already has, or at the very least, lessen any ongoing harm recovery *** restore to a better state (either the state prior to the incident, or if we did not detect the problem immediately, prior to when the issue started) EU Directive 95/46/EC *** EU regulation that safeguards personally identifiable information

Show more Read less
Institution
WGU C836 INFORMATION SECURITY
Module
WGU C836 INFORMATION SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836 INFORMATION SECURITY
Module
WGU C836 INFORMATION SECURITY

Document information

Uploaded on
July 27, 2023
Number of pages
34
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AceTests UON
Follow You need to be logged in order to follow users or courses
Sold
133
Member since
2 year
Number of followers
36
Documents
3386
Last sold
6 days ago
⭐INQUIRE AND ACQUIRE⭐ LOOKING FOR BETTER GRADES? YOU ARE IN THE RIGHT PLACE!✅

An online platform containing verified documents of Question & Answers , 100% verified and approved by qualified personnel from Harvard University and University of New York, Guaranteed A+ score. Information obtained from trained tutors and experienced collogue professors. ⚡OFFERS⚡ -Buy 2 bundles and get 1 free -Buy 3 documents and get 1 free NOW AVAILABLE; Request a desired document via stuvia message and receive it in 4 hours time

Read more Read less
3.6

29 reviews

5
11
4
7
3
4
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions