100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU Fundamentals of Information Security - C836 Questions with Detailed Verified Answers

Rating
-
Sold
-
Pages
48
Grade
A+
Uploaded on
13-10-2025
Written in
2025/2026

CIA Triad Ans: Confidentiality, Integrity, Availability: Essentially the balance between IT Security (Confidentiality and Integrity,) and Business Need (Availability.) those who are authorized to interact with it. CIA Triad - Confidentiality Ans: Addresses the importance of data security. Data should not be exposed or accessible to parties other than An example of upholding the standards of this principle: Creating authentication, authorization, and access controls to control who has access to what information, and how each individual with access can interact with that information. CIA Triad - Integrity Ans: This principle mandates that data should not be tampered with or modified in such a way as to compromise the reliability of the information. An example of upholding the standards of this principle: Hashing or encrypting data as it's in transit or at rest to monitor the information for unauthorized changes or prevent attackers from accessing the da

Show more Read less
Institution
C836
Course
C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836
Course
C836

Document information

Uploaded on
October 13, 2025
Number of pages
48
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1



WGU Fundamentals of Information Security -
C836 Questions with Detailed Verified
Answers



CIA Triad Ans: Confidentiality, Integrity, Availability:



Essentially the balance between IT Security (Confidentiality and
Integrity,) and Business Need (Availability.)

CIA Triad - Confidentiality Ans: Addresses the importance of data
security. Data should not be exposed or accessible to parties other than
those who are authorized to interact with it.



An example of upholding the standards of this principle: Creating
authentication, authorization, and access controls to control who has
access to what information, and how each individual with access can
interact with that information.

CIA Triad - Integrity Ans: This principle mandates that data should not
be tampered with or modified in such a way as to compromise the
reliability of the information.



An example of upholding the standards of this principle: Hashing or
encrypting data as it's in transit or at rest to monitor the information for
unauthorized changes or prevent attackers from accessing the data.

, Page | 2

CIA Triad - Availability Ans: This principle focuses on the need for
businesses to balance the principles of _____________ and
_____________, whilst also allowing authorized parties to access and
interact with data.

Parkerian Hexad - Ans: A less well-known model named after Donn
Parker. Provides a somewhat more complex variation of the classic CIA
triad.



Consists of six principles:



Confidentiality

Integrity

Authenticity

Utility

Possession

Availability

Parkerian Hexad - Confidentiality Ans: Refers to our ability to protect
our data from those who are not authorized to view it. Can be
implemented at many levels of a process.

Parkerian Hexad - Integrity Ans: The ability to prevent people from
changing your data in an unauthorized or undesirable manner. To
maintain this principle, not only do you need to have the means to
prevent unauthorized changes to your data, but you need the ability to
reverse unwanted authorized changes.

, Page | 3

The difference between this Parkerian version and the CIA version: The
data must be whole and completely unchanged from its previous state.

Parkerian Hexad - Authenticity Ans: This principle allows you to say
whether you've attributed the data in question to the proper owner or
creator.



For example:



If you send an email message that is altered so that it appears to have
come from a different email address than the one from which it was
actually sent, you would be violating the ___________ of the email.

Parkerian Hexad - Utility Ans: Refers to how useful the data is to you.
This is the only principle of the Perkerian hexad that is not necessarily
binary in nature; you can have a variety of degrees of _______,
depending on the data and its format.



For example:



If we lost a shipment of backup tapes, some encrypted and some not, an
attacker or other unauthorized person would consider the encrypted
tapes to be of very little ______, as the data would not be readable.
However, the unencrypted tapes would be of much greater ________, as
the attacker or unauthorized person would be able to access the data.

Parkerian Hexad - Possession (Control) Ans: Refers to the physical
disposition of the media on which the data is stored. This enables you to
discuss your loss of the data in its physical medium without involving
other factors such as availability.

, Page | 4



For example:



If we lost a shipment of backup tapes, some encrypted and some not, we
could use this principle to describe the scope of the incident more
accurately- the encrypted tapes in the lot cause a possession problem,
but not a confidentiality problem, while the unencrypted tapes cause a
problem on both counts.

Parkerian Hexad - Availability Ans: The ability to access our data when
we need it.

Attacks - Interception Ans: These attacks allow unauthorized users to
access your data, applications, or environments, and they are primarily
attacks against confidentiality.



May take the form of unauthorized file viewing or copying, eavesdropping
on phone conversations, or reading someone else's email, and you can
conduct it against data at rest or in motion.



When executed properly, these attacks can be quite difficult to detect.

Attacks - Interruption Ans: These attacks make your assets unusable or
unavailable to you on a temporary or permanent basis.



Often affect availability but can also affect integrity as well. A DoS or
DDoS attack would be considered an availability attack. On the other
hand, if an attacker manipulated the processes on which a database runs
to prevent access to the data it contains, you might consider this an

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ivie Southern New Hampshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
17
Member since
7 months
Number of followers
1
Documents
6820
Last sold
1 week ago

3.3

6 reviews

5
2
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions