WGU C836 FUNDAMENTALS OF INFORMATION
SECURITY OA LATEST EXAM 2023 QUESTIONS
AND VERIFIED CORRECT ANSWERS A+ GRADE
Practice questions for this set
Learn
Studied 7 terms
Nice work, you're crushing it
Continue studying in Learn
Terms in this set (186)
Protecting an organization's information and
Information Security information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
Requirements that are set forth by laws and
Compliance
industry regulations.
CIA Confidentiality, Integrity, Availability
Refers to our ability to protect our data from those
Confidentiality
who are not authorized to use/view it
The ability to prevent people from changing your data
Integrity
in an unauthorized or undesirable manner
https://quizlet.com/988077088/wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-questions-and-verified-correct-answers-a-grade-f… 1/13
, 12/24/24, 1:11 AM WGU C836 FUNDAMENTALS OF INFORMATION SECURITY OA LATEST EXAM 2023 QUESTIONS AND VERIFIED CORRECT …
Refers to the ability to access our data when we need
Availability
it
refers to the physical disposition of the media on
Possession/Control which the data is stored. (tape examples where some
are encrypted and some are not)
whether you've attributed the data in question to the
proper owner or creator. (altered email that says it's
Authenticity
from one person when it's not - violation of the
authenticity of the email)
Utility refers to how useful the data is to you.
interception, interruption, modification, and
Attacks
fabrication
attacks that allow unauthorized users to access your
Interception data, applications, or environments. Are primarily
attacks against confidentiality
attacks that make your assets unusable or unavailable
Interruption to you temporarily or permanently. DoS attack on a
mail server, for example. May also affect integrity
attacks involve tampering with our asset. Such attacks
Modification might primarily be considered an integrity attack but
could also represent an availability attack.
attacks involve generating data, processes,
communications, or other similar activities with a
Fabrication
system. Fabrication attacks primarily affect integrity
but could be considered an availability attack as well.
is the likelihood that an event will occur. To have risk
Risk there must be a
threat and vulnerability.
are any events being man-made, natural or
Threats
environmental that could cause damage to assets.
are a weakness that a threat event or the threat agent
Vulnerabilities
can take advantage of.
https://quizlet.com/988077088/wgu-c836-fundamentals-of-information-security-oa-latest-exam-2023-questions-and-verified-correct-answers-a-grade-f… 2/13