100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Objective Assessment Final 2025 with 200 accurate and verified questions covering Fundamentals of Information Security, including risk management, cryptography, network security, and access control

Rating
-
Sold
-
Pages
61
Grade
A+
Uploaded on
28-05-2025
Written in
2024/2025

WGU C836 Objective Assessment Final 2025 with 200 accurate and verified questions covering Fundamentals of Information Security, including risk management, cryptography, network security, and access control

Institution
Wgu University
Course
Wgu university











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Wgu university
Course
Wgu university

Document information

Uploaded on
May 28, 2025
Number of pages
61
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836 Objective Assessment Final 2025 with
200 accurate and verified questions covering
Fundamentals of Information Security, including
risk management, cryptography, network
security, and access control




CIA Triad <<<correct answer>>>Confidentiality, Integrity, Availability:


Essentially the balance between IT Security (Confidentiality and
Integrity,) and Business Need (Availability.)


CIA Triad - Confidentiality <<<correct answer>>>Addresses the
importance of data security. Data should not be exposed or accessible
to parties other than those who are authorized to interact with it.


An example of upholding the standards of this principle: Creating
authentication, authorization, and access controls to control who has
access to what information, and how each individual with access can
interact with that information.

,CIA Triad - Integrity <<<correct answer>>>This principle mandates that
data should not be tampered with or modified in such a way as to
compromise the reliability of the information.


An example of upholding the standards of this principle: Hashing or
encrypting data as it's in transit or at rest to monitor the information for
unauthorized changes or prevent attackers from accessing the data.


CIA Triad - Availability <<<correct answer>>>This principle focuses on
the need for businesses to balance the principles of _____________
and _____________, whilst also allowing authorized parties to access
and interact with data.


Information Security (InfoSec) <<<correct answer>>>


Parkerian Hexad - <<<correct answer>>>A less well-known model
named after Donn Parker. Provides a somewhat more complex variation
of the classic CIA triad.


Consists of six principles:


Confidentiality
Integrity

,Authenticity
Utility
Possession
Availability


Parkerian Hexad - Confidentiality <<<correct answer>>>Refers to our
ability to protect our data from those who are not authorized to view it.
Can be implemented at many levels of a process.


Parkerian Hexad - Integrity <<<correct answer>>>The ability to prevent
people from changing your data in an unauthorized or undesirable
manner. To maintain this principle, not only do you need to have the
means to prevent unauthorized changes to your data, but you need the
ability to reverse unwanted authorized changes.


The difference between this Parkerian version and the CIA version: The
data must be whole and completely unchanged from its previous state.


Parkerian Hexad - Authenticity <<<correct answer>>>This principle
allows you to say whether you've attributed the data in question to the
proper owner or creator.


For example:

, If you send an email message that is altered so that it appears to have
come from a different email address than the one from which it was
actually sent, you would be violating the ___________ of the email.


Parkerian Hexad - Utility <<<correct answer>>>Refers to how useful
the data is to you. This is the only principle of the Perkerian hexad that
is not necessarily binary in nature; you can have a variety of degrees of
_______, depending on the data and its format.


For example:


If we lost a shipment of backup tapes, some encrypted and some not,
an attacker or other unauthorized person would consider the encrypted
tapes to be of very little ______, as the data would not be readable.
However, the unencrypted tapes would be of much greater ________,
as the attacker or unauthorized person would be able to access the
data.


Parkerian Hexad - Possession (Control) <<<correct answer>>>Refers to
the physical disposition of the media on which the data is stored. This
enables you to discuss your loss of the data in its physical medium
without involving other factors such as availability.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTotur2 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
117
Member since
8 months
Number of followers
15
Documents
2460
Last sold
1 hour ago
Teachme2 TUTOR

Hi! ,I'm Nurse Simeon , a certified TeachMe2 Totur with over 5 helping University and college students succeed. I am a Verified Nursing Tutor specializing in Ihuman Case Studies, Advanced pharmacology (NR565), HESI, TEAS 7, Pediatrics and More, creating HIGH QUALITY,EXAM FOCUSED STUDY GUIDES. Every document is crafted to be clear, accurate, and easy understanding saving you study time and improving your grades. Whatever you are preparing for Hesi A2, NCLEX or University coursework ,my notes are trusted by hundreds of students like you. ✅ Backed by toturing experience. ✅ Organized by topic and exam need. ✅ Instant access and affordable pricing. Let's help you pass smarter ,not harder. Browse my store now !

Read more Read less
3.1

17 reviews

5
3
4
4
3
5
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions