WGU C836 Fundamentals of Information Security (WGUC836)
Western Governors University
Page 4 out of 43 results
Sort by
-
C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED.
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
C836 (Lesson 2), Exam Questions & Answers, Rated A+. VERIFIED. 
 
 
Identity verification - -Something that supports our claim to identity, either in our personal interactions or in computer systems, e.g. social security cards 
 
Falsifying identification - -Authentication requirements help prevent this crime 
 
Authentication - -A set of methods we use to establish a claim of identity as being true 
 
Something you know - -A password is an example of this type of factor 
 
Something you are - -...
-
WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $7.49
- + learn more
WGU C836 - Chapter 5: Cryptography, Exam Review Questions & Answers, Rated A+ 
 
 
The science of keeping information secure - -Cryptography 
 
The science of breaking through the encryption used to create ciphertext - -Cryptanalysis 
 
The overarching field of study that covers cryptography and cryptanalysis - -Cryptology 
 
The specifics of the process used to encrypt the plaintext or decrypt the ciphertext - -Cryptographic Algorithm 
 
Another name for unencrypted data - -Plaintext (or Cleart...
-
WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified.
- Exam (elaborations) • 4 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
WGU C836 Pre Assessment Questions & Answers. 100% Accurate. Verified. 
 
 
At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised? - -Integrity 
 
An organization plans to encrypt data in transit on a network. Which aspect of data is the organization attempting to protect? - -Integrity 
 
Which aspect of the CIA triad is violated by an unauthorized database roll back or undo? - -Integrity 
 
A company's website has suffered s...
-
Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED.
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $10.49
- + learn more
Fundamentals of Information Security - C836. Exam Questions & Answers. VERIFIED. 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
Confidentiality - -Our ability to protect our data from those unauthorized to view it. 
 
Integrity - -The ability to prevent our data from being changed in an unauthorized or undesirable manner. 
 
Availability - -The ability to access our data when we n...
-
C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+
- Exam (elaborations) • 2 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
C836 CHAPTER 11 WGU Exam Questions & Answers. Graded A+ 
 
 
OS hardening - -the process of reducing the number of available avenues through which our OS might be attacked 
 
attack surface - -The total of the areas through which our operating system might be attacked 
 
6 main hardening categories - -1. Removing unnecessary software 
2. Removing or turning off unessential services 
3. Making alterations to common accounts 
4. Applying the principle of least privilege 
5. Applying software updat...
As you read this, a fellow student has made another $4.70
-
WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED.
- Exam (elaborations) • 5 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
WGU C836 pre assessment Questions & Answers. 100% Accurate. VERIFIED. 
 
 
Port scanner - -Which tool can be used to map devices on a network, along with their operating system types and versions? 
 
SQL Injection - -Which web attack is a server-side attack? 
 
Availability - -A company has had several successful denial of service (DoS) attacks on its email server. 
 
Which security principle is being attacked? 
 
SQL Injection - -Which web attack is possible due to a lack of input validation?...
-
WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+
- Exam (elaborations) • 45 pages • 2023
- Available in package deal
-
- $12.49
- + learn more
WGU C836 - Fundamentals of Information Security Study Notes. Exam Questions & Answers. Graded A+ 
 
 
Information Security - -Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
The Confidentiality, Integrity, and Availability Triad (CIA) - -Three of the primary concepts in information security. Gives us a model by which we can think about and discuss security concepts, and tends to be very focused on security, as...
-
C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED.
- Exam (elaborations) • 5 pages • 2023
- Available in package deal
-
- $8.49
- + learn more
C836 - Lesson 1. Exam Questions and answers, rated A+. VERIFIED. 
 
 
What is information security? - -It is keeping data, hardware, and software secure from unauthorized access, use, disclosure, disruption, modification or destruction. 
 
What order should assets be protected in? - -Most important to least. People, data, hardware/software 
 
What is compliance? - -Compliance is a term that is used very often in the ITSEC community. Compliance is the requirements that are set forth by laws and i...
-
Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED.
- Exam (elaborations) • 3 pages • 2023
- Available in package deal
-
- $7.99
- + learn more
Fundamentals of Information Security WGU C836. Exam Questions and answers, VERIFIED. 
 
 
Which cybersecurity term is defined as the potential for an attack on a resource? - -Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - -honeypots 
 
which tool can be used to map devices on a network, along with their operating system types and versions? - -Port scanner 
 
Which web attack is a server-side attack? - -SQL injection 
 
An organizatio...
-
WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), L
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $9.49
- + learn more
WGU C836 Fundamentals of Information Security. Exam Review Questions & Answers, Graded A+. 
What is Information Security? (1), Identification and Authentication (2), Authorization and Access Control (3), Auditing and Accountability (4), Cryptography (5), Laws and Regulations (6) 
 
What are the 4 basic tasks for access controls? ACL 
Allowing access, denying access, limiting access, and revoking access. 
 
 
What is a Sandbox? 
A set of resources devoted to a program, outside of which the entity...
How did he do that? By selling his study resources on Stuvia. Try it yourself! Discover all about earning on Stuvia