- Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about ? On this page you'll find 70 study documents about .
All 70 results
Sort by
-
WGU Fundamentals of Information Security | 2025 | - C836 Questions with Detailed Verified Answers
- Exam (elaborations) • 47 pages • 2025
-
- $14.49
- + learn more
WGU Fundamentals of Information Security 
| 2025 | - C836 Questions with Detailed 
Verified Answers 
 
1. A type of tool that uses signature matching or anomaly 
detection (heuristics) to detect malware threats, either in real 
time or by performing scans of files and processes - 
ANSWER anti-malware tool 
 
2. in this method of security, a person's capabilities are oriented 
around the use of a token that controls their access (e.g. a 
personal badge) - ANSWER capability-based se...
-
WGU Fundamentals of Information Security - C836 Questions with Detailed Verified Answers | Latest Update 2025 | Sure to Pass!!
- Exam (elaborations) • 28 pages • 2025
-
- $13.99
- + learn more
WGU Fundamentals of Information Security - C836 Questions with Detailed Verified 
Answers | Latest Update 2025 | Sure to Pass!! 
 
 
1.Which act regulates the United Sates department of 
education? - ANSWER FERPA - This protects the privacy 
of student records 
 
2.Which act regulates federal departments in the United States? - ANSWER FISMA - Mandates government agencies to 
protect information systems. 
 
3.Which act regulates customer privacy in the finance industry? - ANSWER GLB...
-
WGU Fundamentals of Information Security - C836 Questions with Detailed Verified Answers
- Exam (elaborations) • 48 pages • 2025
-
- $13.99
- + learn more
CIA Triad Ans: Confidentiality, Integrity, Availability: 
Essentially the balance between IT Security (Confidentiality and 
Integrity,) and Business Need (Availability.) 
those who are authorized to interact with it. 
CIA Triad - Confidentiality Ans: Addresses the importance of data 
security. Data should not be exposed or accessible to parties other than 
An example of upholding the standards of this principle: Creating 
authentication, authorization, and access controls to control w...
C836 - Fundamentals of Information Security 
(WGU) Questions with Detailed Verified 
Answers
C836 WGU Questions and Answers
C836 WGU COMPLETE Questions and 
Answers
C836 WGU Questions and Answers
-
WGU C836 – Fundamentals of Information Security 200+ (2025–2026 Full Exam Kit) Solved Q&A | Correct & Verified Answers
- Exam (elaborations) • 65 pages • 2025
-
- $12.49
- + learn more
This comprehensive exam kit includes over 200 verified questions and answers for WGU C836 – Fundamentals of Information Security, updated for the 2025–2026 academic cycle. Topics include CIA triad, Parkerian hexad, access control models, encryption standards, risk management, incident response, and regulatory frameworks (FERPA, HIPAA, FISMA, GLBA, SOX). Ideal for students preparing for WGU’s cybersecurity certification, with content aligned to official objectives and reviewed by subject ma...
-
WGU C836 PRE ASSESSMENT 35+ (2025–2026 Updated) Solved Exams + 100% Verified Solutions | Complete Q&A
- Exam (elaborations) • 11 pages • 2025
-
- $11.49
- + learn more
This document contains over 35 solved questions and answers for the WGU C836 Pre-Assessment, updated for the 2025–2026 academic cycle. Topics include CIA triad principles, access control models, cryptographic tools, malware prevention, and vulnerability detection. Ideal for students preparing for WGU’s cybersecurity fundamentals exam, with content aligned to current course objectives and verified by subject matter experts.
-
C836 Exam And Review Updated Chapter 1 To Chapter 6 Questions And Answer Verified 100% Correct
- Exam (elaborations) • 19 pages • 2025
-
- $13.99
- + learn more
C836 Exam And Review Updated Chapter 1 To Chapter 6 
Questions And Answer Verified 100% Correct 
 
CHAPTER 1 
Identify the four types of attacks (i.e., interception, interruption, modification, and fabrication). - Interception attacks allow unauthorized users to access our data, applications, 
or environments, and are primarily an attack against confidentiality. Interception 
might take the form unauthorized file viewing or copying, eavesdropping on 
phone conversations, or reading e-m...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia