100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
19-03-2025
Written in
2024/2025

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED

Institution
WGU C836 MULTI/COMPREHENSIVE
Course
WGU C836 MULTI/COMPREHENSIVE











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836 MULTI/COMPREHENSIVE
Course
WGU C836 MULTI/COMPREHENSIVE

Document information

Uploaded on
March 19, 2025
Number of pages
31
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…




WGU C836 MULTI/COMPREHENSIVE FINAL
EXAM REVIEW QUESTIONS AND ANSWERS
ALREADY PASSED

Save




Terms in this set (173)


The Fabrication attack Integrity and Availability
type most commonly
affects which principle(s)
of the CIA triad?


A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and
Integrity




https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 1/31

,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


The Interception attack Confidentiality
type most commonly
affects which principle(s)
of the CIA triad? This task
contains the radio buttons
and checkboxes for
options. The shortcut keys
to perform this task are A
to H and alt+1 to alt+9.


A.Integrity and Availability
B.Confidentiality and
Integrity
C.Availability
D.Integrity
E.Confidentiality

Something that has the Threat
potential to cause harm to
our assets is known as a(n)
________.


A.Threat
B.Impact
C.Risk
D.Vulnerability

Controls that protect the Logical Control
systems, networks, and
environments that
process, transmit, and
store our data are called
_______.


A.Logical controls
B.Administrative controls
C.Physical controls


https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 2/31

,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


What is the first and Identify assets
arguably one of the most
important steps of the risk
management process?
A.Assess risks
B.Mitigate risks
C.Identify threats
D.Assess vulnerabilities
E.Identify assets

Protects information and information security
information systems from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction

A type of attack, primarily Interception
against confidentiality

Something that has the Threat
potential to cause harm to
our assets

A weakness that can be Vulnerability
used to harm us

The likelihood that Risk
something bad will
happen

An attack that involves Modification attack
tampering with our assets

A model that adds three Parkerian hexad
more principles to the CIA
triad: possession or
control, utility, and
authenticity



https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 3/31

, 3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


The physical disposition of Possession or control
the media on which the
data is stored

An attack that involves Fabrication attack
generating data,
processes,
communications, or other
similar activities with a
system

A multilayered defense Defense in depth
that will allow us to
achieve a successful
defense should one or
more of our defensive
measures fail

Sometimes called Logical controls
technical controls, these
protect the systems,
networks, and
environments that
process, transmit, and
store our data

Controls that protect the Physical controls
physical environment in
which our systems sit, or
where our data is stored

The risk management Preparation phase
phase that consists of all
of the activities that we
can perform in advance of
the incident itself, in order
to better enable us to
handle it



https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 4/31

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DICKENS maryland university
View profile
Follow You need to be logged in order to follow users or courses
Sold
2265
Member since
10 months
Number of followers
4
Documents
2044
Last sold
1 day ago
PROSTUDYHUB

4.9

984 reviews

5
867
4
100
3
12
2
4
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions