100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C836 Exam 2025 | Fundamentals of Information Security Exam | Questions and Correct Answers | Western Governors University | Just Released

Beoordeling
-
Verkocht
-
Pagina's
44
Cijfer
A+
Geüpload op
04-06-2025
Geschreven in
2024/2025

The WGU C836 Exam 2025 focuses on the fundamentals of information security, providing comprehensive insights into key concepts and mechanisms essential for protecting digital and physical infrastructures. This guide is particularly beneficial for students at Western Governors University preparing for the exam. It covers various types of malware and security tools, including the infamous Stuxnet malware, which targets SCADA systems, illustrating the potential for malware to cause physical damage. The document also explains the role of anti-malware tools, which utilize signature matching and anomaly detection (heuristics) to safeguard systems. Additionally, the exam material delves into database security issues, highlighting critical vulnerabilities such as protocol issues, unauthenticated access, arbitrary code execution, and privilege escalation. It also underscores the importance of web application analysis tools in identifying flaws like XSS, SQL injection, and improperly configured permissions.

Meer zien Lees minder
Instelling
WGU C836 Fundamentals Of Information Security
Vak
WGU C836 Fundamentals of Information Security











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C836 Fundamentals of Information Security
Vak
WGU C836 Fundamentals of Information Security

Documentinformatie

Geüpload op
4 juni 2025
Aantal pagina's
44
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU C836 Exam 2025 | Fundamentals of
Information Security Exam | Questions and
Correct Answers | Western Governors
University | Just Released

A particularly complex and impactful item of malware that targeted the
Supervisory Control and Data Acquisition (SCADA) systems that run various
industrial processes; this piece of malware raised the bar for malware from largely
being a virtual-based attack to actually being physically destructive ---------
CORRECT ANSWER-----------------stuxnet




A type of tool that uses signature matching or anomaly detection (heuristics) to
detect malware threats, either in real-time or by performing scans of files and
processes ---------CORRECT ANSWER-----------------anti-malware tool




The process of anomaly detection used by anti-malware tools to detect malware
without signatures ---------CORRECT ANSWER-----------------heuristics




A hardware and software-based technology that prevents certain portions of the
memory used by the operating system and applications from being used to
execute code ---------CORRECT ANSWER-----------------executable space protection

,The act of inputting more data than an application is expecting from a particular
input, creating the possibility of executing commands by specifically crafting the
excess data ---------CORRECT ANSWER-----------------buffer overflow (overrun)




A security method that involves shifting the contents of memory around to make
tampering difficult ---------CORRECT ANSWER-----------------ASLR (Address Space
Layout Randomization)




This type of firewall generally contains a subset of the features on a large firewall
appliance but is often capable of similar packet filtering and stateful packet
inspection activities ---------CORRECT ANSWER-----------------software firewall




A system used to analyze the activities on or directed at the network interface of
a particular host.
* may communicate with management device by sending regular beacons ---------
CORRECT ANSWER-----------------HIDS (host-based intrusion detection system)




a type of tool that can detect various security flaws when examining hosts ---------
CORRECT ANSWER-----------------scanner




A tool that is aimed specifically at the task of finding and reporting network
services on hosts that have known vulnerabilities ---------CORRECT ANSWER---------
--------vulnerability assessment tool

,A well-known vulnerability assessment tool that includes a port scanner ---------
CORRECT ANSWER-----------------Nessus




The 1st Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you don't know the threat, how do you know what to protect?




The 2nd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER--------
---------If you don't know what to protect, how do you know you are protecting it?




The 3rd Law of Haas' Laws of Operations Security ---------CORRECT ANSWER---------
--------If you are not protecting it, the dragon wins!




Services that are hosted, often over the Internet, for the purposes of delivering
easily scaled computing services or resources ---------CORRECT ANSWER--------------
---cloud computing




1st step in the OPSEC process, arguably the most important: to identify the assets
that most need protection and will cause us the most harm if exposed ---------
CORRECT ANSWER-----------------identification of critical information

, 2nd step in the OPSEC process: to look at the potential harm or financial impact
that might be caused by critical information being exposed, and who might
exploit that exposure ---------CORRECT ANSWER-----------------analysis of threats




3rd step in the OPSEC process: to look at the weaknesses that can be used to
harm us ---------CORRECT ANSWER-----------------analysis of vulnerabilities




4th step in the OPSEC process: to determine what issues we really need to be
concerned about (areas with matching threats and vulnerabilities) ---------
CORRECT ANSWER-----------------assessment of risks




5th step in the OPSEC process: to put measures in place to mitigate risks ---------
CORRECT ANSWER-----------------appliance of countermeasures




This law provides a framework for ensuring the effectiveness of information
security controls in federal government
- changed from Management (2002) to Modernization in 2014 ---------CORRECT
ANSWER-----------------FISMA (Federal Information Security Modernization Act)

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nevilletadayo Capella University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
826
Lid sinds
2 jaar
Aantal volgers
456
Documenten
3144
Laatst verkocht
1 dag geleden
INVEST IN YOUR FUTURE EXCELLENCE TODAY!

Unlock Your Academic Success: Gain Access to Expertly Crafted Exams, Flash Cards, Test Banks, and Study Guides on this Premium Stuvia Account. Elevate Your Learning Experience and Achieve Top Grades with our Comprehensive and Time-Saving Resources.

4,6

315 beoordelingen

5
247
4
37
3
14
2
6
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen