100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 Exam | Fundamentals of Information Security | Questions and Correct Answers | Western Governors University | Latest Exam

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
04-08-2025
Written in
2025/2026

WGU C836 Exam | Fundamentals of Information Security | Questions and Correct Answers | Western Governors University | Latest Exam

Institution
WGU C836 Fundamentals Of Information Security
Course
WGU C836 Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836 Fundamentals of Information Security
Course
WGU C836 Fundamentals of Information Security

Document information

Uploaded on
August 4, 2025
Number of pages
44
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836 Exam | Fundamentals of Information
Security | Questions and Correct Answers |
Western Governors University | Latest Exam

The 1st Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you don't know the threat, how do you know what to protect?




The 2nd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER--------
---------If you don't know what to protect, how do you know you are protecting it?




The 3rd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you are not protecting it, the dragon wins!




Services that are hosted, often over the Internet, for the purposes of delivering
easily scaled computing services or resources ---------CORRECT ANSWER--------------
---cloud computing




1st step in the OPSEC process, arguably the most important: to identify the assets
that most need protection and will cause us the most harm if exposed ---------
CORRECT ANSWER-----------------identification of critical information

,2nd step in the OPSEC process: to look at the potential harm or financial impact
that might be caused by critical information being exposed, and who might
exploit that exposure ---------CORRECT ANSWER-----------------analysis of threats




3rd step in the OPSEC process: to look at the weaknesses that can be used to
harm us ---------CORRECT ANSWER-----------------analysis of vulnerabilities




4th step in the OPSEC process: to determine what issues we really need to be
concerned about (areas with matching threats and vulnerabilities) ---------
CORRECT ANSWER-----------------assessment of risks




5th step in the OPSEC process: to put measures in place to mitigate risks ---------
CORRECT ANSWER-----------------appliance of countermeasures




This law provides a framework for ensuring the effectiveness of information
security controls in federal government
- changed from Management (2002) to Modernization in 2014 ---------CORRECT
ANSWER-----------------FISMA (Federal Information Security Modernization Act)




This law improves the efficiency and effectiveness of the health care system and
protects patient privacy ---------CORRECT ANSWER-----------------HIPAA (Health
Insurance Portability and Accountability Act)

,This law protects the privacy of students and their parents ---------CORRECT
ANSWER-----------------FERPA (Family Educational Rights and Privacy Act)




This law regulates the financial practice and governance of corporations ---------
CORRECT ANSWER-----------------SOX (Sarbanes-Oxley Act)




This law protects the customers of financial institutions ---------CORRECT ANSWER-
----------------GLBA (Gramm-Leach-Bliley Act)




Relating to an organization's adherence to laws, regulations, and standards --------
-CORRECT ANSWER-----------------compliance




Regulations mandated by law usually requiring regular audits and assessments ----
-----CORRECT ANSWER-----------------regulatory compliance




Regulations or standards designed for specific industries that may impact ability
to conduct business (e.g. PCI DSS) ---------CORRECT ANSWER-----------------industry
compliance

, The state or condition of being free from being observed or disturbed by other
people ---------CORRECT ANSWER-----------------privacy




This act safeguards privacy through the establishment of procedural and
substantive rights in personal data ---------CORRECT ANSWER-----------------The
Federal Privacy Act of 1974




to set a limit on the amount of data we expect to receive to set aside storage for
that data
*required in most programming languages
* prevents buffer overflows ---------CORRECT ANSWER-----------------bounds
checking




A type of software development vulnerability that occurs when multiple
processes or multiple threads within a process control or share access to a
particular resource, and the correct handling of that resource depends on the
proper ordering or timing of transactions ---------CORRECT ANSWER-----------------
race conditions




A type of attack that can occur when we fail to validate the input to our
applications or take steps to filter out unexpected or undesirable content ---------
CORRECT ANSWER-----------------input validation

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyWay Capella University
Follow You need to be logged in order to follow users or courses
Sold
103
Member since
2 year
Number of followers
43
Documents
1818
Last sold
3 days ago
INVEST AND UNLEASH THE POWER OF KNOWLEDGE NOW!

THIS PREMIUM STUVIA ACCOUNT GIVES YOU ACCESS TO EXCLUSIVE EXAMS, FLASH CARDS, TEST BANKS, AND STUDY GUIDES TAILORED FOR YOUR SUCCESS. ELEVATE YOUR GRADES, ACCELERATE YOUR LEARNING, AND SUPERCHARGE YOUR STUDIES: DIVE INTO A WORLD OF ACADEMIC EXCELLENCE!

4,5

59 reviews

5
46
4
5
3
3
2
2
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions