100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam (elaborations) C836 - Fundamentals of Information Security (WGU)

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
11-08-2025
Written in
2025/2026

C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXAM QUESTIONS AND ANSWERS

Show more Read less
Institution
C836 - Fundamentals Of Information Security
Course
C836 - Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836 - Fundamentals of Information Security
Course
C836 - Fundamentals of Information Security

Document information

Uploaded on
August 11, 2025
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…




C836 - Fundamentals of Information Security
(WGU)/WGU C836 - FUNDAMENTALS OF
INFORMATION SECURITY LATEST EXAM
QUESTIONS AND ANSWERS



Sometimes called technical Logical Controls
controls, these protect the
systems, networks, and
environments that process,
transmit, and store our
data
based on laws, rules, policies, Administrative Controls
and
procedures, guidelines, and
other items that are "paper"
in nature. They are the
policies that organizations
create for
governance. For example,
acceptable use and email
use policies.
phase of incident response Preparation
consists of all of the
activities that we can
perform, in advance of the
incident itself, in order to
better enable us to
handle it.




… 1/64

,8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

1. Preparation Incident Response Process
2. Detection and Analysis
(Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity:
document/Lessons learned
where the action begins to Detection & Analysis
happen in our incident
response process. In this
phase, we will detect the
occurrence of an issue and
decide whether or not it is
actually an incident, so
that we can respond
appropriately to it.
involves taking steps to ensure Containment
that the
situation does not cause any
more damage than it already
has, or to at least lessen any
ongoing harm.
attempt to remove the effects Eradication
of the issue from our
environment.
restoring devices or data to Recovery
pre-incident state
(rebuilding systems,
reloading
applications, backup media,
etc.)
determine specifically what Post-incident activity
happened, why it happened,
and what we can do to keep
it from happening again.
(postmortem).
who or what we claim to be. Identity
Simply an assertion.
… 2/64

,8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

the act of providing who or Authentication
what we claim to be. More
technically, the set of
methods used to establish
whether a claim is true
simply verifies status of ID. Verification
For example, showing your
driver's license at a bar. "Half-
step" between identity and
authentication
• Something Five Different Types of Authentication
you know:
Username/Pass
word/Pin
• Something you have: ID
badge/swipe card/OTP
• Something you are:
Fingerprint/Iris/Retina scan
• Somewhere you are:
Geolocation
• Something you

do:
Handwriting/typin
g/walking
only using one type of Single-factor authentication
authentication
using two different factors of Dual-factor authentication
authentication (2 of the
same factor does not
count )
Use of several (more than Multi-factor authentication
two)
authentication techniques
together, such as passwords
and security tokens, and
geolocation.
process where the session is Mutual Authentication
authenticated on both ends
and just one end.
… 3/64

, 8/11/25, 3:16 PM C836 - Fundamentals of Information Security (WGU)/WGU C836 - FUNDAMENTALS OF INFORMATION SECURITY LATEST EXA…

man-in-the-middle attacks Mutual authentication prevents what kind of attacks?
Something you know Using a password for access is what kind of authentication
Something you are An iris-scan for access is what kind of authentication
Something you have Using a security key-fob for access is what kind of authentication
Something you are Using biometrics are what kind of authentication
universality, permanence, For biometric authentication one must consider
collectibility, performance,
acceptability, and
circumvention
what a user can access, The level of authorization dictates
modify, and delete
The process of determining Authorization
exactly what an
authenticated party can
do
The principle that you Principle of Least Privilege
should only give a party
the bare minimum level of
access it needs to
perform its
job/functionality
tools and systems used to Access Controls are
allow or deny access, limit
access, or revoke access
physical attributes, sets of Access controls can be based on
rules, lists of individuals or
systems, or other, more
complex factors
are lists containing Access control lists (ACLs)
information about what kind
of access certain parties
are allowed to have to a
given system.
read, write, and execute Access control lists generally list which three kinds of permissions
filter access based on Network ACLs
indentifers used for network
transactions, such as

… 4/64

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSEGENERAL Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
85
Member since
1 year
Number of followers
4
Documents
8213
Last sold
4 hours ago
Homeland bookshop

It is a modern bookshop that provide accurate documents such as revision papers ,exams , notes , essays , summaries , flashcards and other study materials. Discover any material you want on my site and feel free to contact me at my email WELCOME ALL !!!! WELCOME ALL!!

4.1

13 reviews

5
7
4
3
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions