100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU Fundamentals of Information Security | 2025 | - C836 Questions with Detailed Verified Answers

Rating
-
Sold
-
Pages
47
Grade
A+
Uploaded on
22-10-2025
Written in
2025/2026

WGU Fundamentals of Information Security | 2025 | - C836 Questions with Detailed Verified Answers 1. A type of tool that uses signature matching or anomaly detection (heuristics) to detect malware threats, either in real time or by performing scans of files and processes - ANSWER anti-malware tool 2. in this method of security, a person's capabilities are oriented around the use of a token that controls their access (e.g. a personal badge) - ANSWER capability-based security 3. A type of attack that is more common in systems that use ACLs rather than capabilities; - when software has greater permissions than user, the user can trick the software into misusing authority - ANSWER confused deputy problem 4. a type of attack that misuses the authority of the browser on the user's computer - ANSWER CSRF (Cross Site Request Forgery) 5. client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on in order to execute a command differing from what a user thinks they are performing - takes advantage of some of the page rendering features that are available in newer browsers - ANSWER clickjacking (user interface redressing) 6. access control model in which access is determined by the owner of the resource in question - e.g. network share permissions - ANSWER DAC (Discretionary Access Control) 7. access is based on the role the individual is performing - similar to MAC in that access controls are set by an authority responsible for doing so, rather than by the owner of the resource - ANSWER RBAC (Role Based Access Control) 8. access control model in which access is based on attributes (of a person, a resource, or an environment) - ANSWER ABAC (attribute-based access control)

Show more Read less
Institution
C836
Course
C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836
Course
C836

Document information

Uploaded on
October 22, 2025
Number of pages
47
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU Fundamentals of Information Security
| 2025 | - C836 Questions with Detailed
Verified Answers

1. A type of tool that uses signature matching or anomaly
detection (heuristics) to detect malware threats, either in real-
time or by performing scans of files and processes -
ANSWER anti-malware tool


2. in this method of security, a person's capabilities are oriented
around the use of a token that controls their access (e.g. a
personal badge) - ANSWER capability-based security


3. A type of attack that is more common in systems that use
ACLs rather than capabilities;
- when software has greater permissions than user, the
user can trick the software into misusing authority -
ANSWER confused deputy problem


4. a type of attack that misuses the authority of the browser on
the user's computer - ANSWER CSRF (Cross Site Request
Forgery)

,5. client-side attack that involves the attacker placing an
invisible layer over something on a website that the user
would normally click on in order to execute a command
differing from what a user thinks they are performing
- takes advantage of some of the page rendering features
that are available in newer browsers - ANSWER
clickjacking (user interface redressing)


6. access control model in which access is determined by the
owner of the resource in question
- e.g. network share permissions - ANSWER DAC
(Discretionary Access Control)


7. access is based on the role the individual is performing
- similar to MAC in that access controls are set by an
authority responsible for doing so, rather than by the
owner of the resource - ANSWER RBAC (Role
Based Access Control)


8. access control model in which access is based on attributes (of
a person, a resource, or an environment) - ANSWER
ABAC (attribute-based access control)

,9. Attributes of a particular individual, such as height -
ANSWER subject attributes


10. Attributes that relate to a particular resource, such as
operating system or application - ANSWER resource
attributes


11. Attributes that relate to environmental conditions, such as
time of day or length of time - ANSWER environmental
attributes


- Designed to prevent conflicts of interest
- commonly used in industries that handle sensitive data
- 3 main resources classes are considered in this model:
objects, company groups, and conflict classes -
ANSWER ✔ Brewer and Nash model


12. A combination of DAC and MAC, primarily concerned
with the confidentiality of the resource.
- 2 security properties define how information can flow
to and from the resource: the simple security property

, and the * property - ANSWER Bell-LaPadula
Model


13. Primarily concerned with protecting the integrity of data,
even at the expense of confidentiality.
- 2 security rules: the simple integrity axiom and the *
integrity axiom - ANSWER Biba model


14. A method by which a person follows directly behind
another person who authenticates to the physical access
control measure, thus allowing the follower to gain access
without authenticating - ANSWER Tailgating


15. Access controls that regulate movement into and out of
building or facilities - ANSWER Physical access controls


16. An access control model that includes many tiers of
security and is used extensively by military and government
organizations and those that handle data of a very sensitive
nature - ANSWER Multilevel access control model

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Exchequer Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
59
Member since
11 months
Number of followers
1
Documents
1423
Last sold
3 days ago
EXEMPLARY SERVICE IN ACADEMIA EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I CAN DO ASSIGNMENTS, EXAMS,ESSAYS AND RESEARCH PROJECTS FOR YOU EVEN AT STRICT DEADLINES. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, FREE of any fee.

Read more Read less
2.8

8 reviews

5
3
4
0
3
1
2
0
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions