100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU Fundamentals of Information Security - C836 || 100% Verified Answers.

Puntuación
-
Vendido
-
Páginas
39
Grado
A+
Subido en
30-08-2025
Escrito en
2025/2026

CIA Triad correct answers Confidentiality, Integrity, Availability: Essentially the balance between IT Security (Confidentiality and Integrity,) and Business Need (Availability.) CIA Triad - Confidentiality correct answers Addresses the importance of data security. Data should not be exposed or accessible to parties other than those who are authorized to interact with it. An example of upholding the standards of this principle: Creating authentication, authorization, and access controls to control who has access to what information, and how each individual with access can interact with that information. CIA Triad - Integrity correct answers This principle mandates that data should not be tampered with or modified in such a way as to compromise the reliability of the information. An example of upholding the standards of this principle: Hashing or encrypting data as it's in transit or at rest to monitor the information for unauthorized changes or prevent attackers from accessing the data. CIA Triad - Availability correct answers This principle focuses on the need for businesses to balance the principles of _____________ and _____________, whilst also allowing authorized parties to access and interact with data. Information Security (InfoSec) correct answers Parkerian Hexad - correct answers A less well-known model named after Donn Parker. Provides a somewhat more complex variation of the classic CIA triad.

Mostrar más Leer menos
Institución
Fundamentals Of Information Security
Grado
Fundamentals of Information Security











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Fundamentals of Information Security
Grado
Fundamentals of Information Security

Información del documento

Subido en
30 de agosto de 2025
Número de páginas
39
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU Fundamentals of Information Security - C836 || 100%
Verified Answers.


CIA Triad correct answers Confidentiality, Integrity, Availability:


Essentially the balance between IT Security (Confidentiality and Integrity,) and Business Need
(Availability.)


CIA Triad - Confidentiality correct answers Addresses the importance of data security. Data
should not be exposed or accessible to parties other than those who are authorized to interact
with it.


An example of upholding the standards of this principle: Creating authentication, authorization,
and access controls to control who has access to what information, and how each individual with
access can interact with that information.


CIA Triad - Integrity correct answers This principle mandates that data should not be tampered
with or modified in such a way as to compromise the reliability of the information.


An example of upholding the standards of this principle: Hashing or encrypting data as it's in
transit or at rest to monitor the information for unauthorized changes or prevent attackers from
accessing the data.


CIA Triad - Availability correct answers This principle focuses on the need for businesses to
balance the principles of _____________ and _____________, whilst also allowing authorized
parties to access and interact with data.


Information Security (InfoSec) correct answers


Parkerian Hexad - correct answers A less well-known model named after Donn Parker. Provides
a somewhat more complex variation of the classic CIA triad.

,Consists of six principles:


Confidentiality
Integrity
Authenticity
Utility
Possession
Availability


Parkerian Hexad - Confidentiality correct answers Refers to our ability to protect our data from
those who are not authorized to view it. Can be implemented at many levels of a process.


Parkerian Hexad - Integrity correct answers The ability to prevent people from changing your
data in an unauthorized or undesirable manner. To maintain this principle, not only do you need
to have the means to prevent unauthorized changes to your data, but you need the ability to
reverse unwanted authorized changes.


The difference between this Parkerian version and the CIA version: The data must be whole and
completely unchanged from its previous state.


Parkerian Hexad - Authenticity correct answers This principle allows you to say whether you've
attributed the data in question to the proper owner or creator.


For example:


If you send an email message that is altered so that it appears to have come from a different
email address than the one from which it was actually sent, you would be violating the
___________ of the email.

,Parkerian Hexad - Utility correct answers Refers to how useful the data is to you. This is the only
principle of the Perkerian hexad that is not necessarily binary in nature; you can have a variety of
degrees of _______, depending on the data and its format.


For example:


If we lost a shipment of backup tapes, some encrypted and some not, an attacker or other
unauthorized person would consider the encrypted tapes to be of very little ______, as the data
would not be readable. However, the unencrypted tapes would be of much greater ________, as
the attacker or unauthorized person would be able to access the data.


Parkerian Hexad - Possession (Control) correct answers Refers to the physical disposition of the
media on which the data is stored. This enables you to discuss your loss of the data in its physical
medium without involving other factors such as availability.


For example:


If we lost a shipment of backup tapes, some encrypted and some not, we could use this principle
to describe the scope of the incident more accurately- the encrypted tapes in the lot cause a
possession problem, but not a confidentiality problem, while the unencrypted tapes cause a
problem on both counts.


Parkerian Hexad - Availability correct answers The ability to access our data when we need it.


Attacks - Interception correct answers These attacks allow unauthorized users to access your
data, applications, or environments, and they are primarily attacks against confidentiality.


May take the form of unauthorized file viewing or copying, eavesdropping on phone
conversations, or reading someone else's email, and you can conduct it against data at rest or in
motion.

, When executed properly, these attacks can be quite difficult to detect.


Attacks - Interruption correct answers These attacks make your assets unusable or unavailable to
you on a temporary or permanent basis.


Often affect availability but can also affect integrity as well. A DoS or DDoS attack would be
considered an availability attack. On the other hand, if an attacker manipulated the processes on
which a database runs to prevent access to the data it contains, you might consider this an
integrity attack because of the possible loss or corruption of data. It could even be considered a
combination of the two.


Can also be considered a modification attack in certain contexts.


Attacks - Modification correct answers These attacks involve tampering with an asset.


Such attacks might primarily be considered attacks on integrity, but could also represent attacks
on availability.


If you access a file in an unauthorized manner and alter the data it contains, you've affected the
integrity of the file's data. However, if the file in question is a configuration file that manages
how a service behaves- perhaps one that is acting as a web server-changing the contents of the
file might affect the availability of that service. If the configuration you altered in the file for
your web server changes how the server deals with encrypted connections, you could even call
this a confidentiality attack.


Attacks - Fabrication correct answers These attacks involve generating data, processes,
communications, or other similar material with a system. Like modification and interruption
attacks, these attacks primarily affect integrity but could affect availability as well.


Generating fake information in a database would be a kind of __________ attack. You could also
generate email, a common method for propagating malware. If you generated enough additional
processes, network traffic, email, web traffic, or nearly anything else that consumes resources,
$16.29
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
737
Miembro desde
3 año
Número de seguidores
437
Documentos
34833
Última venta
3 días hace
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lee mas Leer menos
3.7

110 reseñas

5
46
4
20
3
22
2
8
1
14

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes