100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

C836 - Fundamentals of Information Security (WGU) Exam Questions Correctly Answered

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
08-08-2025
Written in
2025/2026

C836 - Fundamentals of Information Security (WGU) Exam Questions Correctly Answered

Institution
C836 - Fundamentals Of Information Security
Course
C836 - Fundamentals of Information Security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C836 - Fundamentals of Information Security
Course
C836 - Fundamentals of Information Security

Document information

Uploaded on
August 8, 2025
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

C836 - Fundamentals of Information
Security (WGU) Exam Questions
Correctly Answered

Information Security - ANS Protecting an organization's information and information
systems from unauthorized access, use, disclosure, disruption, modification, or
destruction.

Compliance - ANS Requirements that are set forth by laws and
industry regulations.

CIA - ANS Confidentiality, Integrity, Availability

Confidentiality - ANS Refers to our ability to protect our data from those who are not
authorized to use/view it

Integrity - ANS The ability to prevent people from changing your data in an unauthorized
or undesirable manner

Availability - ANS Refers to the ability to access our data when we need it

Possession/Control - ANS refers to the physical disposition of the media on which the
data is stored. (tape examples where some are encrypted and some are not)

Authenticity - ANS whether you've attributed the data in question to the proper owner or
creator. (altered email that says it's from one person when it's not - violation of the
authenticity of the email)

Utility - ANS refers to how useful the data is to you.

Attacks - ANS interception, interruption, modification, and
fabrication

Interception - ANS attacks that allow unauthorized users to access your data,
applications, or environments. Are primarily attacks against confidentiality

,Interruption - ANS attacks that make your assets unusable or unavailable to you
temporarily or permanently. DoS attack on a mail server, for example. May also affect
integrity

Modification - ANS attacks involve tampering with our asset. Such attacks might
primarily be considered an integrity attack but could also represent an availability attack.

Fabrication - ANS attacks involve generating data, processes, communications, or other
similar activities with a system. Fabrication attacks primarily affect integrity but could be
considered an availability attack as well.

Risk - ANS is the likelihood that an event will occur. To have risk there must be a
threat and vulnerability.

Threats - ANS are any events being man-made, natural or environmental that could
cause damage to assets.

Vulnerabilities - ANS are a weakness that a threat event or the threat agent can take
advantage of.

Impact - ANS takes into account the value of the asset being threatened and uses it to
calculate risk

Risk Management Process - ANS Identify assets, identify threats, assess vulnerabilities,
assess risks, mitigate risks

Defense in Depth - ANS Using multiple layers of security to defend your assets.

Controls - ANS are the ways we protect assets. Three different types: physical, logical,
administrative

Physical Controls - ANS environment; physical items that protect assets think locks,
doors, guards, and, fences or environmental factors (time)

Logical Controls - ANS Sometimes called technical controls, these protect the systems,
networks, and environments that process, transmit, and store our data

Administrative Controls - ANS based on laws, rules, policies, and procedures,
guidelines, and other items that are "paper" in nature. They are the policies that
organizations create for governance. For example, acceptable use and email use policies.

Preparation - ANS phase of incident response consists of all of the activities that we can
perform, in advance of the incident itself, in order to better enable us to handle it.

, Incident Response Process - ANS 1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Detection & Analysis - ANS where the action begins to happen in our incident response
process. In this phase, we will detect the occurrence of an issue and decide whether or
not it is actually an incident, so that we can respond appropriately to it.

Containment - ANS involves taking steps to ensure that the situation does not cause
any more damage than it already has, or to at least lessen any ongoing harm.

Eradication - ANS attempt to remove the effects of the issue from our environment.

Recovery - ANS restoring devices or data to pre-incident state (rebuilding systems,
reloading applications, backup media, etc.)

Post-incident activity - ANS determine specifically what happened, why it happened,
and what we can do to keep it from happening again. (postmortem).

Identity - ANS who or what we claim to be. Simply an assertion.

Authentication - ANS the act of providing who or what we claim to be. More technically,
the set of methods used to establish whether a claim is true

Verification - ANS simply verifies status of ID. For example, showing your driver's
license at a bar. "Half-step" between identity and authentication

Five Different Types of Authentication - ANS • Something you know:
Username/Password/Pin
• Something you have: ID badge/swipe card/OTP
• Something you are: Fingerprint/Iris/Retina scan
• Somewhere you are: Geolocation
• Something you do: Handwriting/typing/walking

Single-factor authentication - ANS only using one type of authentication

Dual-factor authentication - ANS using two different factors of authentication (2 of the
same factor does not count )

Multi-factor authentication - ANS Use of several (more than two) authentication
techniques together, such as passwords and security tokens, and geolocation.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CUTENURSE1 Chamberlian School of Nursing
Follow You need to be logged in order to follow users or courses
Sold
106
Member since
3 year
Number of followers
30
Documents
2339
Last sold
4 hours ago
excellect study guide

MY specialty at Teachme2expert is offering premium, expert-verified study guides for a variety of nursing and medical exams. Our specialty at Teachme2expert is offering premium, expert-verified study guides for a variety of nursing and medical exams. With the use of our materials, nursing students, medical professionals, and test takers can easily accomplish their educational and certification objectives. Our Offerings: Complete Nursing Exam Guides: Proctored exam solutions, in-depth responses, and explanations for ATI, NCLEX, HESI, and other exams. Study Guides for Pharmacology and Pathophysiology: The most recent test questions and confirmed answers for 2024 are included for advanced courses such as NSG 530 and NSG 533. Resources on Psychopharmacology: Comprehensive study guides and test banks for courses like NSG 552 are available. Medical Case Studies: thorough case studies and scenarios (NRNP 6531, for example) that are examined by professionals and concentrate on the medical history, diagnosis, and treatment strategies of the patients. Theoretical Esthetician You will always have access to the most recent versions, the most recent content, and answers that have already received an A+ because every document is carefully selected. Why Opt for ME ? Vast Variety of Subjects: We cover everything, from fundamental nursing concepts to specialized qualifications and real-world medical case studies. Use our reliable resources to help you prepare for your exam! thank you

Read more Read less
4,6

19 reviews

5
15
4
3
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions