100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED

Puntuación
-
Vendido
-
Páginas
31
Grado
A+
Subido en
19-03-2025
Escrito en
2024/2025

WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED

Institución
WGU C836 MULTI/COMPREHENSIVE
Grado
WGU C836 MULTI/COMPREHENSIVE











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C836 MULTI/COMPREHENSIVE
Grado
WGU C836 MULTI/COMPREHENSIVE

Información del documento

Subido en
19 de marzo de 2025
Número de páginas
31
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…




WGU C836 MULTI/COMPREHENSIVE FINAL
EXAM REVIEW QUESTIONS AND ANSWERS
ALREADY PASSED

Save




Terms in this set (173)


The Fabrication attack Integrity and Availability
type most commonly
affects which principle(s)
of the CIA triad?


A. Availability
B. Integrity
C. Confidentiality
D. Integrity and Availability
E. Confidentiality and
Integrity




https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 1/31

,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


The Interception attack Confidentiality
type most commonly
affects which principle(s)
of the CIA triad? This task
contains the radio buttons
and checkboxes for
options. The shortcut keys
to perform this task are A
to H and alt+1 to alt+9.


A.Integrity and Availability
B.Confidentiality and
Integrity
C.Availability
D.Integrity
E.Confidentiality

Something that has the Threat
potential to cause harm to
our assets is known as a(n)
________.


A.Threat
B.Impact
C.Risk
D.Vulnerability

Controls that protect the Logical Control
systems, networks, and
environments that
process, transmit, and
store our data are called
_______.


A.Logical controls
B.Administrative controls
C.Physical controls


https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 2/31

,3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


What is the first and Identify assets
arguably one of the most
important steps of the risk
management process?
A.Assess risks
B.Mitigate risks
C.Identify threats
D.Assess vulnerabilities
E.Identify assets

Protects information and information security
information systems from
unauthorized access, use,
disclosure, disruption,
modification, or
destruction

A type of attack, primarily Interception
against confidentiality

Something that has the Threat
potential to cause harm to
our assets

A weakness that can be Vulnerability
used to harm us

The likelihood that Risk
something bad will
happen

An attack that involves Modification attack
tampering with our assets

A model that adds three Parkerian hexad
more principles to the CIA
triad: possession or
control, utility, and
authenticity



https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 3/31

, 3/19/25, 8:53 PM WGU C836 MULTI/COMPREHENSIVE FINAL EXAM REVIEW QUESTIONS AND ANSWERS ALREADY PASSED Flashcards | Qu…


The physical disposition of Possession or control
the media on which the
data is stored

An attack that involves Fabrication attack
generating data,
processes,
communications, or other
similar activities with a
system

A multilayered defense Defense in depth
that will allow us to
achieve a successful
defense should one or
more of our defensive
measures fail

Sometimes called Logical controls
technical controls, these
protect the systems,
networks, and
environments that
process, transmit, and
store our data

Controls that protect the Physical controls
physical environment in
which our systems sit, or
where our data is stored

The risk management Preparation phase
phase that consists of all
of the activities that we
can perform in advance of
the incident itself, in order
to better enable us to
handle it



https://quizlet.com/1020394052/wgu-c836-multicomprehensive-final-exam-review-questions-and-answers-already-passed-flash-cards/?new 4/31
$22.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
DICKENS maryland university
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2265
Miembro desde
10 meses
Número de seguidores
4
Documentos
2044
Última venta
1 día hace
PROSTUDYHUB

4.9

984 reseñas

5
867
4
100
3
12
2
4
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes