Package deal
WGU C836 Fundamentals of Information security Bundle COMPLETE SOLUTION
WGU C836 Fundamentals of Information security Bundle COMPLETE SOLUTION
[Show more]WGU C836 Fundamentals of Information security Bundle COMPLETE SOLUTION
[Show more]Which cybersecurity term is defined as the potential for an attack on a resource? 
A Impact 
B Vulnerability 
C Risk 
D Threat - CORRECT ANSWER-D 
Which security type deliberately exposes a system's vulnerabilities or resources to an 
attacker? 
A Intrusion detection 
B Firewalls 
C Honeypots 
D In...
Preview 4 out of 40 pages
Add to cartWhich cybersecurity term is defined as the potential for an attack on a resource? 
A Impact 
B Vulnerability 
C Risk 
D Threat - CORRECT ANSWER-D 
Which security type deliberately exposes a system's vulnerabilities or resources to an 
attacker? 
A Intrusion detection 
B Firewalls 
C Honeypots 
D In...
CIA Triad - CORRECT ANSWER-Confidentiality, Integrity, Availability 
Parkerian hexad - CORRECT ANSWER-Where the CIA triad consists of confidentiality, 
integrity, and availability, the Parkerian hexad consists of these three principles, as well 
as possession or control, authenticity, and utility 
C...
Preview 3 out of 17 pages
Add to cartCIA Triad - CORRECT ANSWER-Confidentiality, Integrity, Availability 
Parkerian hexad - CORRECT ANSWER-Where the CIA triad consists of confidentiality, 
integrity, and availability, the Parkerian hexad consists of these three principles, as well 
as possession or control, authenticity, and utility 
C...
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - CORRECT ANSWER-Integrity and Availability 
The Interception attack type most commonly affects w...
Preview 3 out of 25 pages
Add to cartThe Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - CORRECT ANSWER-Integrity and Availability 
The Interception attack type most commonly affects w...
What is Information Security? - CORRECT ANSWER-Protecting information and 
information systems from: 
1. Unauthorized access, 
2. use, 
3. disclosure, 
4. disruption, 
5. modification, or 
6. destruction. 
logical assets - CORRECT ANSWER-assets that exists as data or intellectual property. 
PCI DDS ...
Preview 4 out of 32 pages
Add to cartWhat is Information Security? - CORRECT ANSWER-Protecting information and 
information systems from: 
1. Unauthorized access, 
2. use, 
3. disclosure, 
4. disruption, 
5. modification, or 
6. destruction. 
logical assets - CORRECT ANSWER-assets that exists as data or intellectual property. 
PCI DDS ...
Which cybersecurity term is defined as the potential for an attack on a resource? - 
CORRECT ANSWER-Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an 
attacker? - CORRECT ANSWER-Honeypots 
Which tool can be used to map devices on a network, along with th...
Preview 2 out of 10 pages
Add to cartWhich cybersecurity term is defined as the potential for an attack on a resource? - 
CORRECT ANSWER-Threat 
Which security type deliberately exposes a system's vulnerabilities or resources to an 
attacker? - CORRECT ANSWER-Honeypots 
Which tool can be used to map devices on a network, along with th...
bounds checking - CORRECT ANSWER-to set a limit on the amount of data we expect 
to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
race conditions - CORRECT ANSWER-A type of software development vulnerability 
that occurs when multip...
Preview 3 out of 22 pages
Add to cartbounds checking - CORRECT ANSWER-to set a limit on the amount of data we expect 
to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
race conditions - CORRECT ANSWER-A type of software development vulnerability 
that occurs when multip...
C836 Fundamentals of Information 
security Terms 
Protecting information and information systems from unauthorized access, use, 
disclosure, disruption, modification, or destruction - CORRECT ANSWER-Information 
Security 
Companies that process credit card payments must comply with this set of stand...
Preview 3 out of 19 pages
Add to cartC836 Fundamentals of Information 
security Terms 
Protecting information and information systems from unauthorized access, use, 
disclosure, disruption, modification, or destruction - CORRECT ANSWER-Information 
Security 
Companies that process credit card payments must comply with this set of stand...
Information Security - CORRECT ANSWER-Protecting an organization's information 
and information systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction. 
Compliance - CORRECT ANSWER-Requirements that are set forth by laws and 
industry regulations. 
CIA - CORREC...
Preview 3 out of 27 pages
Add to cartInformation Security - CORRECT ANSWER-Protecting an organization's information 
and information systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction. 
Compliance - CORRECT ANSWER-Requirements that are set forth by laws and 
industry regulations. 
CIA - CORREC...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.
No, you only buy these notes for $18.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
80202 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now