Package deal
WGU C836 Pre Assessment Study guide 2024 bundle
WGU C836 Pre Assessment Study guide 2024 bundle
[Show more]WGU C836 Pre Assessment Study guide 2024 bundle
[Show more]bounds checking - to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - A type of software development vulnerability that occurs when multiple processes or multiple threa...
Preview 3 out of 24 pages
Add to cartbounds checking - to set a limit on the amount of data we expect to receive to set aside storage for that data 
*required in most programming languages 
* prevents buffer overflows 
 
race conditions - A type of software development vulnerability that occurs when multiple processes or multiple threa...
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - Integrity and Availability 
 
The Interception attack type most commonly affects which princi...
Preview 3 out of 30 pages
Add to cartThe Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity - Integrity and Availability 
 
The Interception attack type most commonly affects which princi...
CIA Triad - Confidentiality, Integrity, Availability 
 
Parkerian hexad - Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility 
 
Confidentiality - Refers to o...
Preview 3 out of 19 pages
Add to cartCIA Triad - Confidentiality, Integrity, Availability 
 
Parkerian hexad - Where the CIA triad consists of confidentiality, integrity, and availability, the Parkerian hexad consists of these three principles, as well as possession or control, authenticity, and utility 
 
Confidentiality - Refers to o...
Which cybersecurity term is defined as the potential for an attack on resource? - Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - Honeypots 
 
Which tool can be used to map devices on a network, along with their operating system and version...
Preview 2 out of 11 pages
Add to cartWhich cybersecurity term is defined as the potential for an attack on resource? - Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attack? - Honeypots 
 
Which tool can be used to map devices on a network, along with their operating system and version...
Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - Information Security 
 
Companies that process credit card payments must comply with this set of standards - Payment Card Industry Data Security Standard (PCI DSS) 
 
...
Preview 3 out of 21 pages
Add to cartProtecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction - Information Security 
 
Companies that process credit card payments must comply with this set of standards - Payment Card Industry Data Security Standard (PCI DSS) 
 
...
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - Integrity 
 
An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to protect? - Integrity 
 
Which aspect of t...
Preview 1 out of 4 pages
Add to cartAt a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - Integrity 
 
An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to protect? - Integrity 
 
Which aspect of t...
Interception - A type of attack, against confidentiality 
 
Interruption attack - An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
Risk - The likelihood that something bad will happen 
 
Vulnerability - A weakness that can be used t...
Preview 1 out of 3 pages
Add to cartInterception - A type of attack, against confidentiality 
 
Interruption attack - An attack that causes our assets to become unusable or unavailable for our use, on a temporary or permanent basis 
 
Risk - The likelihood that something bad will happen 
 
Vulnerability - A weakness that can be used t...
Define the confidentiality, integrity, availability (CIA) triad. 
the core model of all of information security 
Differentiate confidentiality, integrity, and availability. 
Confidential is allowing only those authorized to access the data requested. 
Integrity is keeping data unaltered by Accidenta...
Preview 3 out of 24 pages
Add to cartDefine the confidentiality, integrity, availability (CIA) triad. 
the core model of all of information security 
Differentiate confidentiality, integrity, and availability. 
Confidential is allowing only those authorized to access the data requested. 
Integrity is keeping data unaltered by Accidenta...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller CleanA. Stuvia facilitates payment to the seller.
No, you only buy these notes for $40.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
79223 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now