Package deal
WGU C836 PACKAGE DEAL|GRADED A|GUARANTEED SUCCESS
WGU C836 PACKAGE DEAL|GRADED A|GUARANTEED SUCCESS
[Show more]WGU C836 PACKAGE DEAL|GRADED A|GUARANTEED SUCCESS
[Show more]bounds checking 
to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
 
 
race conditions 
A type of software development vulnerability that occurs when multiple processes or multiple thr...
Preview 3 out of 27 pages
Add to cartbounds checking 
to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
 
 
race conditions 
A type of software development vulnerability that occurs when multiple processes or multiple thr...
Which cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat 
D 
 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion...
Preview 4 out of 54 pages
Add to cartWhich cybersecurity term is defined as the potential for an attack on a resource? 
 
A Impact 
B Vulnerability 
C Risk 
D Threat 
D 
 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? 
 
A Intrusion detection 
B Firewalls 
C Honeypots 
D Intrusion...
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity 
Integrity and Availability 
 
 
 
The Interception attack type most commonly affects which pri...
Preview 4 out of 32 pages
Add to cartThe Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity 
Integrity and Availability 
 
 
 
The Interception attack type most commonly affects which pri...
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction 
Information Security 
 
 
 
Companies that process credit card payments must comply with this set of standards 
Payment Card Industry Data Security Standard (PCI DSS) 
...
Preview 3 out of 24 pages
Add to cartProtecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction 
Information Security 
 
 
 
Companies that process credit card payments must comply with this set of standards 
Payment Card Industry Data Security Standard (PCI DSS) 
...
Which cybersecurity term is defined as the potential for an attack on resource? 
Threat 
 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? 
Honeypots 
 
 
 
Which tool can be used to map devices on a network, along with their operating system and v...
Preview 2 out of 12 pages
Add to cartWhich cybersecurity term is defined as the potential for an attack on resource? 
Threat 
 
 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? 
Honeypots 
 
 
 
Which tool can be used to map devices on a network, along with their operating system and v...
Parkerian hexad 
Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility 
 
 
 
Confidentiality 
Refers to our ability to protect our data from those who are not ...
Preview 3 out of 20 pages
Add to cartParkerian hexad 
Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility 
 
 
 
Confidentiality 
Refers to our ability to protect our data from those who are not ...
Which social engineering technique involves impersonating someone else to convince the target to perform some action that they wouldn't normally do for a stranger? 
 
A Pretexting 
B Phishing 
C Spear phishing 
D Tailgating 
A Pretexting 
 
 
 
You swipe your key card to gain access to a secure are...
Preview 3 out of 20 pages
Add to cartWhich social engineering technique involves impersonating someone else to convince the target to perform some action that they wouldn't normally do for a stranger? 
 
A Pretexting 
B Phishing 
C Spear phishing 
D Tailgating 
A Pretexting 
 
 
 
You swipe your key card to gain access to a secure are...
Interception 
A type of attack, against confidentiality 
 
 
 
Interruption attack 
An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
 
 
Risk 
The likelihood that something bad will happen 
 
 
 
Vulnerability 
A weakness that can b...
Preview 1 out of 3 pages
Add to cartInterception 
A type of attack, against confidentiality 
 
 
 
Interruption attack 
An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
 
 
Risk 
The likelihood that something bad will happen 
 
 
 
Vulnerability 
A weakness that can b...
FISMA (Federal Information Security Modernization Act) 
this law provides a framework for ensuring the effectiveness of information security controls in federal government 
- changed from Management (2002) to Modernization in 2014 
 
 
 
HIPAA (Health Insurance Portability and Accountability Act) 
t...
Preview 2 out of 14 pages
Add to cartFISMA (Federal Information Security Modernization Act) 
this law provides a framework for ensuring the effectiveness of information security controls in federal government 
- changed from Management (2002) to Modernization in 2014 
 
 
 
HIPAA (Health Insurance Portability and Accountability Act) 
t...
SOX (Sarbanes-Oxley Act) 
Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 
 
 
 
FISMA (Federal Information Security Management Act) 
 
 
 
PCI DSS (Payment Card Industry Data Security Standard) 
 
 
 
Confidentialit...
Preview 1 out of 3 pages
Add to cartSOX (Sarbanes-Oxley Act) 
Requires companies to review internal control and take responsibility for the accuracy and completeness of their financial reports. 
 
 
 
FISMA (Federal Information Security Management Act) 
 
 
 
PCI DSS (Payment Card Industry Data Security Standard) 
 
 
 
Confidentialit...
Identity verification 
Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards 
 
 
 
Falsifying identification 
Authentication requirements help prevent this crime 
 
 
 
Authentication 
A set of methods we use to establi...
Preview 1 out of 3 pages
Add to cartIdentity verification 
Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards 
 
 
 
Falsifying identification 
Authentication requirements help prevent this crime 
 
 
 
Authentication 
A set of methods we use to establi...
accountability 
this provides us with the means to trace activities in our environment back to their source 
 
 
 
nonrepudiation 
Refers to a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action 
...
Preview 1 out of 2 pages
Add to cartaccountability 
this provides us with the means to trace activities in our environment back to their source 
 
 
 
nonrepudiation 
Refers to a situation in which sufficient evidence exists as to prevent an individual from successfully denying that he or she has made a statement, or taken an action 
...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller GUARANTEEDSUCCESS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $49.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
77254 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now