100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Exam 2025 | Fundamentals of Information Security Exam | Questions and Correct Answers | Western Governors University | Just Released

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
04-06-2025
Written in
2024/2025

The WGU C836 Exam 2025 focuses on the fundamentals of information security, providing comprehensive insights into key concepts and mechanisms essential for protecting digital and physical infrastructures. This guide is particularly beneficial for students at Western Governors University preparing for the exam. It covers various types of malware and security tools, including the infamous Stuxnet malware, which targets SCADA systems, illustrating the potential for malware to cause physical damage. The document also explains the role of anti-malware tools, which utilize signature matching and anomaly detection (heuristics) to safeguard systems. Additionally, the exam material delves into database security issues, highlighting critical vulnerabilities such as protocol issues, unauthenticated access, arbitrary code execution, and privilege escalation. It also underscores the importance of web application analysis tools in identifying flaws like XSS, SQL injection, and improperly configured permissions.

Show more Read less
Institution
WGU C836 Fundamentals Of Information Security
Course
WGU C836 Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836 Fundamentals of Information Security
Course
WGU C836 Fundamentals of Information Security

Document information

Uploaded on
June 4, 2025
Number of pages
44
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C836 Exam 2025 | Fundamentals of
Information Security Exam | Questions and
Correct Answers | Western Governors
University | Just Released

A particularly complex and impactful item of malware that targeted the
Supervisory Control and Data Acquisition (SCADA) systems that run various
industrial processes; this piece of malware raised the bar for malware from largely
being a virtual-based attack to actually being physically destructive ---------
CORRECT ANSWER-----------------stuxnet




A type of tool that uses signature matching or anomaly detection (heuristics) to
detect malware threats, either in real-time or by performing scans of files and
processes ---------CORRECT ANSWER-----------------anti-malware tool




The process of anomaly detection used by anti-malware tools to detect malware
without signatures ---------CORRECT ANSWER-----------------heuristics




A hardware and software-based technology that prevents certain portions of the
memory used by the operating system and applications from being used to
execute code ---------CORRECT ANSWER-----------------executable space protection

,The act of inputting more data than an application is expecting from a particular
input, creating the possibility of executing commands by specifically crafting the
excess data ---------CORRECT ANSWER-----------------buffer overflow (overrun)




A security method that involves shifting the contents of memory around to make
tampering difficult ---------CORRECT ANSWER-----------------ASLR (Address Space
Layout Randomization)




This type of firewall generally contains a subset of the features on a large firewall
appliance but is often capable of similar packet filtering and stateful packet
inspection activities ---------CORRECT ANSWER-----------------software firewall




A system used to analyze the activities on or directed at the network interface of
a particular host.
* may communicate with management device by sending regular beacons ---------
CORRECT ANSWER-----------------HIDS (host-based intrusion detection system)




a type of tool that can detect various security flaws when examining hosts ---------
CORRECT ANSWER-----------------scanner




A tool that is aimed specifically at the task of finding and reporting network
services on hosts that have known vulnerabilities ---------CORRECT ANSWER---------
--------vulnerability assessment tool

,A well-known vulnerability assessment tool that includes a port scanner ---------
CORRECT ANSWER-----------------Nessus




The 1st Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you don't know the threat, how do you know what to protect?




The 2nd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER--------
---------If you don't know what to protect, how do you know you are protecting it?




The 3rd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you are not protecting it, the dragon wins!




Services that are hosted, often over the Internet, for the purposes of delivering
easily scaled computing services or resources ---------CORRECT ANSWER--------------
---cloud computing




1st step in the OPSEC process, arguably the most important: to identify the assets
that most need protection and will cause us the most harm if exposed ---------
CORRECT ANSWER-----------------identification of critical information

, 2nd step in the OPSEC process: to look at the potential harm or financial impact
that might be caused by critical information being exposed, and who might
exploit that exposure ---------CORRECT ANSWER-----------------analysis of threats




3rd step in the OPSEC process: to look at the weaknesses that can be used to
harm us ---------CORRECT ANSWER-----------------analysis of vulnerabilities




4th step in the OPSEC process: to determine what issues we really need to be
concerned about (areas with matching threats and vulnerabilities) ---------
CORRECT ANSWER-----------------assessment of risks




5th step in the OPSEC process: to put measures in place to mitigate risks ---------
CORRECT ANSWER-----------------appliance of countermeasures




This law provides a framework for ensuring the effectiveness of information
security controls in federal government
- changed from Management (2002) to Modernization in 2014 ---------CORRECT
ANSWER-----------------FISMA (Federal Information Security Modernization Act)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
nevilletadayo Capella University
View profile
Follow You need to be logged in order to follow users or courses
Sold
826
Member since
2 year
Number of followers
456
Documents
3144
Last sold
16 hours ago
INVEST IN YOUR FUTURE EXCELLENCE TODAY!

Unlock Your Academic Success: Gain Access to Expertly Crafted Exams, Flash Cards, Test Banks, and Study Guides on this Premium Stuvia Account. Elevate Your Learning Experience and Achieve Top Grades with our Comprehensive and Time-Saving Resources.

4.6

315 reviews

5
247
4
37
3
14
2
6
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions