100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| ALREADY GRADED A+|| GUARANTEED PASS|| LATEST UPDATE 2025

Rating
-
Sold
-
Pages
56
Grade
A+
Uploaded on
15-11-2025
Written in
2025/2026

WGU C836 FUNDAMENTALS OF INFORMATION SECURITY EXAM WITH VERIFIED QUESTIONS AND ANSWERS|| ALREADY GRADED A+|| GUARANTEED PASS|| LATEST UPDATE 2025 The science of breaking through encryption is known as _____. A Cryptology B Cryptography C Cryptanalysis D Ciphertext - ANSWER-C We are somewhat limited in our ability to protect which type of data? A Data in use B Data at rest C Data in motion - ANSWER-A Some standards are not mandated by law but are managed and enforced by the industry, often via a council or committee. Which of the options below is an example of this industry compliance? A FISMA B PCI DSS C SOX D HIPAA E GLBA - ANSWER-B The Interception attack type most commonly affects which principle(s) of the CIA triad? A Integrity and Availability B Confidentiality and Integrity C Availability D Integrity E Confidentiality - ANSWER-E The Fabrication attack type most commonly affects which principle(s) of the CIA triad? A Availability B Integrity C Confidentiality D Integrity and Availability E Confidentiality and Integrity - ANSWER-D Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. A Physical controls B Logical controls C Administrative controls - ANSWER-B During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? A Containment B Detection and Analysis C Preparation D Post-incident Activity E Recovery - ANSWER-D

Show more Read less
Institution
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU C836 FUNDAMENTALS OF INFORMATION SECURITY

Document information

Uploaded on
November 15, 2025
Number of pages
56
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836 FUNDAMENTALS OF
INFORMATION SECURITY EXAM WITH
VERIFIED QUESTIONS AND ANSWERS||
ALREADY GRADED A+|| GUARANTEED PASS||
LATEST UPDATE 2025




The science of breaking through encryption is known as _____.


A Cryptology
B Cryptography
C Cryptanalysis
D Ciphertext - ANSWER-C


We are somewhat limited in our ability to protect which type of data?


A Data in use
B Data at rest
C Data in motion - ANSWER-A


Some standards are not mandated by law but are managed and enforced by the
industry, often via a council or committee. Which of the options below is an
example of this industry compliance?


A FISMA

,B PCI DSS
C SOX
D HIPAA
E GLBA - ANSWER-B


The Interception attack type most commonly affects which principle(s) of the
CIA triad?


A Integrity and Availability
B Confidentiality and Integrity
C Availability
D Integrity
E Confidentiality - ANSWER-E


The Fabrication attack type most commonly affects which principle(s) of the
CIA triad?


A Availability
B Integrity
C Confidentiality
D Integrity and Availability
E Confidentiality and Integrity - ANSWER-D


Controls that protect the systems, networks, and environments that process,
transmit, and store our data are called _______.


A Physical controls
B Logical controls

,C Administrative controls - ANSWER-B


During what phase of the incident response process do we determine what
happened, why it happened, and what we can do to keep it from happening
again?


A Containment
B Detection and Analysis
C Preparation
D Post-incident Activity
E Recovery - ANSWER-D


The biometric characteristic that measures how well a factor resists change over
time and with advancing age is called __________.


A Collectability
B Acceptability
C Universality
D Uniqueness
E Permanence - ANSWER-E


What type of authentication can prevent a man-in-the-middle attack?


A Something you know
B Something you are
C Something you do
D Multifactor
E Mutual - ANSWER-E

, A badge or token is considered what type of authentication?


A Something you are
B Something you have
C Something you know
D Where you are
E Something you do - ANSWER-B




______ sets limits on the use and disclosure of patient information and grants
individuals rights over their own health records.


A HIPAA
B SOX
C GLBA
D FERPA
E PCI DSS - ANSWER-A


Which software development vulnerability occurs when multiple processes
control or share access to a particular resource, and the correct handling of that
resource depends on the proper ordering or timing of transactions?


A Authentication attacks
B Input validation attacks
C Race conditions
D Buffer overflows
E Authorization attacks - ANSWER-C
R392,09
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
martinmwambingu54
4,0
(1)

Get to know the seller

Seller avatar
martinmwambingu54 Johns Hopkins University
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
4 months
Number of followers
1
Documents
755
Last sold
4 days ago
A+ EXAM ARCHIVES YOUR BLUEPRINT FOR ACADEMIC SUCCESS!

Welcome to A+ EXAM ARCHIVES – Your New Frontier for Academic Success on Stuvia! We\'re pioneering a fresh approach to study resources. We\'re dedicated to bringing you meticulously engineered, verified study solutions designed to unlock your full potential and drive remarkable academic success. Our commitment is clear: to provide cutting-edge content that is not only exceptionally clear and accurate but also strategically optimized to streamline your learning process. Whether you\'re aiming to master complex concepts, prepare for upcoming challenges, or simply seeking intelligent, reliable study tools, our curated collection of next-gen notes, agile summaries, and comprehensive learning frameworks is built to give you a distinct advantage. We understand that today\'s students need more than just information – they need effective, innovative solutions. That\'s why every document we create is thoughtfully developed to meet your specific learning requirements, ensuring you have the powerful tools to navigate your academic journey with absolute confidence. Join us at the forefront of smarter studying. Explore our store today and be among the first to experience a new level of academic support. Activate your A+ potential now!

Read more Read less
4,0

1 reviews

5
0
4
1
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions