3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
WGU C836 MULTI/COMPREHENSIVE FINAL
EXAM REVIEW QUESTIONS AND ANSWERS
ALREADY PASSED
Save
Terms in this set (173)
The Fabrication attack Integrity and Availability
type most commonly
affects which principle(s)
of the CIA triad?
A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and
Integrity
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 1/31
,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
The Interception attack Confidentiality
type most commonly
affects which principle(s)
of the CIA triad? This task
contains the radio buttons
and checkboxes for
options. The shortcut keys
to perform this task are A
to H and alt+1 to alt+9.
A.Integrity and Availability
B.Confidentiality and
Integrity
C.Availability
D.Integrity
E.Confidentiality
Something that has the Threat
potential to cause harm to
our assets is known as a(n)
________.
A.Threat
B.Impact
C.Risk
D.Vulnerability
Controls that protect the Logical Control
systems, networks, and
environments that
process, transmit, and
store our data are called
_______.
A.Logical controls
B.Administrative controls
C.Physical controls
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 2/31
,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
What is the first and Identify assets
arguably one of the most
important steps of the risk
management process?
A.Assess risks
B.Mitigate risks
C.Identify threats
D.Assess vulnerabilities
E.Identify assets
Protects information and information security
information systems from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction
A type of attack, primarily Interception
against confidentiality
Something that has the Threat
potential to cause harm to
our assets
A weakness that can be Vulnerability
used to harm us
The likelihood that Risk
something bad will
happen
An attack that involves Modification attack
tampering with our assets
A model that adds three Parkerian hexad
more principles to the CIA
triad: possession or
control, utility, and
authenticity
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 3/31
, 3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
The physical disposition of Possession or control
the media on which the
data is stored
An attack that involves Fabrication attack
generating data,
processes,
communications, or other
similar activities with a
system
A multilayered defense Defense in depth
that will allow us to
achieve a successful
defense should one or
more of our defensive
measures fail
Sometimes called Logical controls
technical controls, these
protect the systems,
networks, and
environments that
process, transmit, and
store our data
Controls that protect the Physical controls
physical environment in
which our systems sit, or
where our data is stored
The risk management Preparation phase
phase that consists of all
of the activities that we
can perform in advance of
the incident itself, in order
to better enable us to
handle it
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 4/31
WGU C836 MULTI/COMPREHENSIVE FINAL
EXAM REVIEW QUESTIONS AND ANSWERS
ALREADY PASSED
Save
Terms in this set (173)
The Fabrication attack Integrity and Availability
type most commonly
affects which principle(s)
of the CIA triad?
A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and
Integrity
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 1/31
,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
The Interception attack Confidentiality
type most commonly
affects which principle(s)
of the CIA triad? This task
contains the radio buttons
and checkboxes for
options. The shortcut keys
to perform this task are A
to H and alt+1 to alt+9.
A.Integrity and Availability
B.Confidentiality and
Integrity
C.Availability
D.Integrity
E.Confidentiality
Something that has the Threat
potential to cause harm to
our assets is known as a(n)
________.
A.Threat
B.Impact
C.Risk
D.Vulnerability
Controls that protect the Logical Control
systems, networks, and
environments that
process, transmit, and
store our data are called
_______.
A.Logical controls
B.Administrative controls
C.Physical controls
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 2/31
,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
What is the first and Identify assets
arguably one of the most
important steps of the risk
management process?
A.Assess risks
B.Mitigate risks
C.Identify threats
D.Assess vulnerabilities
E.Identify assets
Protects information and information security
information systems from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction
A type of attack, primarily Interception
against confidentiality
Something that has the Threat
potential to cause harm to
our assets
A weakness that can be Vulnerability
used to harm us
The likelihood that Risk
something bad will
happen
An attack that involves Modification attack
tampering with our assets
A model that adds three Parkerian hexad
more principles to the CIA
triad: possession or
control, utility, and
authenticity
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 3/31
, 3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…
The physical disposition of Possession or control
the media on which the
data is stored
An attack that involves Fabrication attack
generating data,
processes,
communications, or other
similar activities with a
system
A multilayered defense Defense in depth
that will allow us to
achieve a successful
defense should one or
more of our defensive
measures fail
Sometimes called Logical controls
technical controls, these
protect the systems,
networks, and
environments that
process, transmit, and
store our data
Controls that protect the Physical controls
physical environment in
which our systems sit, or
where our data is stored
The risk management Preparation phase
phase that consists of all
of the activities that we
can perform in advance of
the incident itself, in order
to better enable us to
handle it
https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 4/31