100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836 OA Study Guide (Overly Informative) Questions And Correct Answers| Get It Corre

Rating
-
Sold
-
Pages
34
Grade
A+
Uploaded on
16-12-2025
Written in
2025/2026

WGU C836 OA Study Guide (Overly Informative) Questions And Correct Answers| Get It Corre

Institution
WGU C836
Course
WGU C836











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836
Course
WGU C836

Document information

Uploaded on
December 16, 2025
Number of pages
34
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU C836 OA Study Guide (Overly
Informative) Questions And Correct
Answers|2026-2027 Get It Correct !!!


CIA Triad -
-Correct Answers
Confidentiality, Integrity, Availability

Parkerian hexad -
-Correct Answers
Where the CIA triad consists of confidentiality, integrity,
and availability, the Parkerian hexad consists of these
three principles, as well as possession or control,
authenticity, and utility

Confidentiality -
-Correct Answers
Refers to our ability to protect our data from those who
are not authorized to view it.

Confidentiality can be compromised by the loss of a
laptop containing data, a person looking over our
shoulder while we type a password, an e-mail
attachment being sent to the wrong person, an attacker
penetrating our systems, or similar issues.

Integrity -
-Correct Answers
Refers to the ability to prevent our data from being
changed in an unauthorized or undesirable manner. This

1

,could mean the unauthorized change or deletion of our
data or portions of our data, or it could mean an
authorized, but undesirable, change or deletion of our
data. To maintain integrity, we not only need to have
the means to prevent unauthorized changes to our data
but also need the ability to reverse authorized changes
that need to be undone.

Availability -
-Correct Answers
refers to the ability to access our data when we need it.
Loss of availability can refer to a wide variety of breaks
anywhere in the chain that allows us access to our data.
Such issues can result from power loss, operating
system or application problems, network attacks,
compromise of a system, or other problems. When such
issues are caused by an outside party, such as an
attacker, they are commonly referred to as a denial of
service (DoS) attack.

Possession or Control -
-Correct Answers
Refers to the physical disposition of the media on which
the data is stored. This enables us, without involving
other factors such as availability, to discuss our loss of
the data in its physical medium

An example is data store be on multiple devices and
there could be numerous versions.

Authenticity -


2

,-Correct Answers
Attribution as to the owner or creator of the data in
question.

Authenticity can be enforced through the use of digital
signatures.

Utility -
-Correct Answers
Refers to how useful the data is to us.

Interception -
-Correct Answers
Interception attacks allow unauthorized users to access
our data, applications, or environments and are
primarily an attack against confidentiality. Interception
might take the form of unauthorized file viewing or
copying, eavesdropping on phone conversations, or
reading e-mail, and can be conducted against data at
rest or in motion. Properly executed, interception
attacks can be very difficult to detect.

Affects Confidentiality

Interruption -
-Correct Answers
Interruption attacks cause our assets to become
unusable or unavailable for our use, on a temporary or
permanent basis. Interruption attacks often affect
availability but can be an attack on integrity as well. In



3

, the case of a DoS attack on a mail server, we would
classify this as an availability attack.

Affects Integrity and availability

Modification -
-Correct Answers
Modification attacks involve tampering with our asset. If
we access a file in an unauthorized manner and alter the
data it contains, we have affected the integrity of the
data contained in the file.

Fabrication -
-Correct Answers
Fabrication attacks involve generating data, processes,
communications, or other similar activities with a
system. Fabrication attacks primarily affect integrity but
could be considered an availability attack as well. If we
generate spurious information in a database, this would
be considered to be a fabrication attack.

Affects Integrity and Availability

Threat -
-Correct Answers
Something that has potential to cause harm

Vulnerability -
-Correct Answers
Weaknesses that can be used to harm us



4
$15.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
DocUniverse

Get to know the seller

Seller avatar
DocUniverse Chamberlain College of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
1 year
Number of followers
1
Documents
1288
Last sold
4 months ago
Exam HUB

Trusted Exam Resources You Can Rely On

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions