100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Fundamentals of Information Security - C836 || 100% Verified Answers.

Rating
-
Sold
-
Pages
39
Grade
A+
Uploaded on
30-08-2025
Written in
2025/2026

CIA Triad correct answers Confidentiality, Integrity, Availability: Essentially the balance between IT Security (Confidentiality and Integrity,) and Business Need (Availability.) CIA Triad - Confidentiality correct answers Addresses the importance of data security. Data should not be exposed or accessible to parties other than those who are authorized to interact with it. An example of upholding the standards of this principle: Creating authentication, authorization, and access controls to control who has access to what information, and how each individual with access can interact with that information. CIA Triad - Integrity correct answers This principle mandates that data should not be tampered with or modified in such a way as to compromise the reliability of the information. An example of upholding the standards of this principle: Hashing or encrypting data as it's in transit or at rest to monitor the information for unauthorized changes or prevent attackers from accessing the data. CIA Triad - Availability correct answers This principle focuses on the need for businesses to balance the principles of _____________ and _____________, whilst also allowing authorized parties to access and interact with data. Information Security (InfoSec) correct answers Parkerian Hexad - correct answers A less well-known model named after Donn Parker. Provides a somewhat more complex variation of the classic CIA triad.

Show more Read less
Institution
Fundamentals Of Information Security
Course
Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Fundamentals of Information Security
Course
Fundamentals of Information Security

Document information

Uploaded on
August 30, 2025
Number of pages
39
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU Fundamentals of Information Security - C836 || 100%
Verified Answers.


CIA Triad correct answers Confidentiality, Integrity, Availability:


Essentially the balance between IT Security (Confidentiality and Integrity,) and Business Need
(Availability.)


CIA Triad - Confidentiality correct answers Addresses the importance of data security. Data
should not be exposed or accessible to parties other than those who are authorized to interact
with it.


An example of upholding the standards of this principle: Creating authentication, authorization,
and access controls to control who has access to what information, and how each individual with
access can interact with that information.


CIA Triad - Integrity correct answers This principle mandates that data should not be tampered
with or modified in such a way as to compromise the reliability of the information.


An example of upholding the standards of this principle: Hashing or encrypting data as it's in
transit or at rest to monitor the information for unauthorized changes or prevent attackers from
accessing the data.


CIA Triad - Availability correct answers This principle focuses on the need for businesses to
balance the principles of _____________ and _____________, whilst also allowing authorized
parties to access and interact with data.


Information Security (InfoSec) correct answers


Parkerian Hexad - correct answers A less well-known model named after Donn Parker. Provides
a somewhat more complex variation of the classic CIA triad.

,Consists of six principles:


Confidentiality
Integrity
Authenticity
Utility
Possession
Availability


Parkerian Hexad - Confidentiality correct answers Refers to our ability to protect our data from
those who are not authorized to view it. Can be implemented at many levels of a process.


Parkerian Hexad - Integrity correct answers The ability to prevent people from changing your
data in an unauthorized or undesirable manner. To maintain this principle, not only do you need
to have the means to prevent unauthorized changes to your data, but you need the ability to
reverse unwanted authorized changes.


The difference between this Parkerian version and the CIA version: The data must be whole and
completely unchanged from its previous state.


Parkerian Hexad - Authenticity correct answers This principle allows you to say whether you've
attributed the data in question to the proper owner or creator.


For example:


If you send an email message that is altered so that it appears to have come from a different
email address than the one from which it was actually sent, you would be violating the
___________ of the email.

,Parkerian Hexad - Utility correct answers Refers to how useful the data is to you. This is the only
principle of the Perkerian hexad that is not necessarily binary in nature; you can have a variety of
degrees of _______, depending on the data and its format.


For example:


If we lost a shipment of backup tapes, some encrypted and some not, an attacker or other
unauthorized person would consider the encrypted tapes to be of very little ______, as the data
would not be readable. However, the unencrypted tapes would be of much greater ________, as
the attacker or unauthorized person would be able to access the data.


Parkerian Hexad - Possession (Control) correct answers Refers to the physical disposition of the
media on which the data is stored. This enables you to discuss your loss of the data in its physical
medium without involving other factors such as availability.


For example:


If we lost a shipment of backup tapes, some encrypted and some not, we could use this principle
to describe the scope of the incident more accurately- the encrypted tapes in the lot cause a
possession problem, but not a confidentiality problem, while the unencrypted tapes cause a
problem on both counts.


Parkerian Hexad - Availability correct answers The ability to access our data when we need it.


Attacks - Interception correct answers These attacks allow unauthorized users to access your
data, applications, or environments, and they are primarily attacks against confidentiality.


May take the form of unauthorized file viewing or copying, eavesdropping on phone
conversations, or reading someone else's email, and you can conduct it against data at rest or in
motion.

, When executed properly, these attacks can be quite difficult to detect.


Attacks - Interruption correct answers These attacks make your assets unusable or unavailable to
you on a temporary or permanent basis.


Often affect availability but can also affect integrity as well. A DoS or DDoS attack would be
considered an availability attack. On the other hand, if an attacker manipulated the processes on
which a database runs to prevent access to the data it contains, you might consider this an
integrity attack because of the possible loss or corruption of data. It could even be considered a
combination of the two.


Can also be considered a modification attack in certain contexts.


Attacks - Modification correct answers These attacks involve tampering with an asset.


Such attacks might primarily be considered attacks on integrity, but could also represent attacks
on availability.


If you access a file in an unauthorized manner and alter the data it contains, you've affected the
integrity of the file's data. However, if the file in question is a configuration file that manages
how a service behaves- perhaps one that is acting as a web server-changing the contents of the
file might affect the availability of that service. If the configuration you altered in the file for
your web server changes how the server deals with encrypted connections, you could even call
this a confidentiality attack.


Attacks - Fabrication correct answers These attacks involve generating data, processes,
communications, or other similar material with a system. Like modification and interruption
attacks, these attacks primarily affect integrity but could affect availability as well.


Generating fake information in a database would be a kind of __________ attack. You could also
generate email, a common method for propagating malware. If you generated enough additional
processes, network traffic, email, web traffic, or nearly anything else that consumes resources,

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
View profile
Follow You need to be logged in order to follow users or courses
Sold
737
Member since
3 year
Number of followers
437
Documents
34833
Last sold
3 days ago
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Read more Read less
3.7

110 reviews

5
46
4
20
3
22
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions