100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 STUDY QUESTIONS

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
11-12-2025
Written in
2025/2026

WGU C836 STUDY QUESTIONS

Institution
Wgu
Course
Wgu










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 11, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

12/11/25, 8:20 PM Edit · WGU C836 STUDY QUESTIONS | Quizlet


Back to set Done


Visible only to me Saved just now


Title

WGU C836 STUDY QUESTIONS


Add a description...




Import



Suggestions




1



What is the CIA triad in information security?

TERM



Confidentiality, Integrity, and Availability.
Image

DEFINITION




2



What is the main purpose of an information security procedure?

TERM


The main purpose of an information security procedure is to provide step-by-step instructions for implementing
and maintaining security controls, in accordance with the organization's security policies. Image


DEFINITION




3



What is the difference between a policy, a standard, and a procedure in the context of information security?

TERM


A policy is a high-level statement that outlines the organization's approach to information security. A standard is
a specific requirement that supports the policy, while a procedure provides step-by-step instructions for Image

implementing the standard.

DEFINITION




4



What is NOT one of the seven domains of a typical IT infrastructure?

https://quizlet.com/1121397224/edit#addRow 1/20

,12/11/25, 8:20 PM Edit · WGU C836 STUDY QUESTIONS | Quizlet


TERM



Human Resources Domain
Image

DEFINITION




5



What are the two main types of information security policies?

TERM



organizational (or enterprise) policies and system-specific policies.
Image

DEFINITION




6



Why is it important to have a policy review and update process in place?

TERM


to ensure that information security policies remain relevant and effective, adapting to changes in technology,
threats, regulatory requirements, and the organization's business environment. Image


DEFINITION




7



What is an example of a security control that would typically be defined in a procedure?

TERM



A firewall rule set
Image

DEFINITION




8



What is the role of the information security awareness and training program in supporting an organization's security policies
and procedures?

TERM


The information security awareness and training program helps to ensure that employees understand and follow
the organization's security policies and procedures, by providing them with the necessary knowledge, skills, and Image

motivation to protect information assets.

DEFINITION




9


https://quizlet.com/1121397224/edit#addRow 2/20

, 12/11/25, 8:20 PM Edit · WGU C836 STUDY QUESTIONS | Quizlet

What are the five functions of the NIST Cybersecurity Framework?

TERM



Identify, Protect, Detect, Respond, and Recover.
Image

DEFINITION




10



What is an operating system?

TERM


An operating system (OS) is a software that manages computer hardware and software resources, and provides
services to applications. Image


DEFINITION




11



What is operating system security?

TERM


Operating system security refers to the measures taken to protect the operating system from unauthorized
access, malicious attacks, and other security threats. Image


DEFINITION




12



What is a privilege escalation attack?

TERM


A privilege escalation attack is a type of security exploit where a user gains access to higher-level privileges
than they are authorized to have. Image


DEFINITION




13



What is a buffer overflow attack?

TERM


A buffer overflow attack is a type of security exploit where a program writes more data to a buffer than it can
handle, causing the buffer to overflow and potentially execute malicious code. Image


DEFINITION




https://quizlet.com/1121397224/edit#addRow 3/20
$11.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Cleverman

Get to know the seller

Seller avatar
Cleverman NURSING
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 months
Number of followers
0
Documents
646
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions