Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU COURSE C836 FUNDAMENTALS OF INFORMATION SECURITY 596 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Beoordeling
-
Verkocht
-
Pagina's
49
Cijfer
A+
Geüpload op
11-03-2026
Geschreven in
2025/2026

WGU COURSE C836 FUNDAMENTALS OF INFORMATION SECURITY 596 2026 QUESTIONS WITH SOLUTIONS GRADED A+

Instelling
WGU COURSE C836
Vak
WGU COURSE C836

Voorbeeld van de inhoud

WGU COURSE C836 FUNDAMENTALS OF
INFORMATION SECURITY 596 2026
QUESTIONS WITH SOLUTIONS GRADED A+

◉ Compliance. Answer: Requirements that are set forth by laws and
industry regulations.


◉ CIA. Answer: Confidentiality, Integrity, Availability


◉ Confidentiality. Answer: Refers to our ability to protect our data
from those who are not authorized to use/view it


◉ Integrity. Answer: The ability to prevent people from changing
your data in an unauthorized or undesirable manner


◉ Availability. Answer: Refers to the ability to access our data when
we need it


◉ Possession/Control. Answer: refers to the physical disposition of
the media on which the data is stored. (tape examples where some
are encrypted and some are not)

,◉ Authenticity. Answer: whether you've attributed the data in
question to the proper owner or creator. (altered email that says it's
from one person when it's not - violation of the authenticity of the
email)


◉ Utility. Answer: refers to how useful the data is to you.


◉ Attacks. Answer: interception, interruption, modification, and
fabrication


◉ Interception. Answer: attacks that allow unauthorized users to
access your data, applications, or environments. Are primarily
attacks against confidentiality


◉ Interruption. Answer: attacks that make your assets unusable or
unavailable to you temporarily or permanently. DoS attack on a mail
server, for example. May also affect integrity


◉ Modification. Answer: attacks involve tampering with our asset.
Such attacks might primarily be considered an integrity attack but
could also represent an availability attack.


◉ Fabrication. Answer: attacks involve generating data, processes,
communications, or other similar activities with a system.

,Fabrication attacks primarily affect integrity but could be
considered an availability attack as well.


◉ Risk. Answer: is the likelihood that an event will occur. To have
risk there must be a
threat and vulnerability.


◉ Threats. Answer: are any events being man-made, natural or
environmental that could cause damage to assets.


◉ Vulnerabilities. Answer: are a weakness that a threat event or the
threat agent can take advantage of.


◉ Impact. Answer: takes into account the value of the asset being
threatened and uses it to calculate risk


◉ Risk Management Process. Answer: Identify assets, identify
threats, assess vulnerabilities, assess risks, mitigate risks


◉ Defense in Depth. Answer: Using multiple layers of security to
defend your assets.


◉ Controls. Answer: are the ways we protect assets. Three different
types: physical, logical, administrative

, ◉ Physical Controls. Answer: environment; physical items that
protect assets think locks, doors, guards, and, fences or
environmental factors (time)


◉ Logical Controls. Answer: Sometimes called technical controls,
these protect the systems, networks, and environments that process,
transmit, and store our data


◉ Administrative Controls. Answer: based on laws, rules, policies,
and procedures, guidelines, and other items that are "paper" in
nature. They are the policies that organizations create for
governance. For example, acceptable use and email use policies.


◉ Preparation. Answer: phase of incident response consists of all of
the activities that we can perform, in advance of the incident itself, in
order to better enable us to handle it.


◉ Incident Response Process. Answer: 1. Preparation
2. Detection and Analysis (Identification)
3. Containment
4. Eradication
5. Recovery
6. Post-incident activity: document/Lessons learned

Geschreven voor

Instelling
WGU COURSE C836
Vak
WGU COURSE C836

Documentinformatie

Geüpload op
11 maart 2026
Aantal pagina's
49
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TopGradeInsider Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
70
Lid sinds
1 jaar
Aantal volgers
2
Documenten
33294
Laatst verkocht
2 dagen geleden
TopGradeInsider

Welcome to TopGradeInsider, your ultimate partner in navigating academic life. We know the pressure you’re under, which is why we’ve curated a massive library of high-quality resources designed to make your life easier. Access reliable test banks, solution manuals, and study guides that clarify complex topics and save you valuable time. Don’t let stress get in the way of your degree let TopGradeInsider give you the support you need to finish strong.

Lees meer Lees minder
4.2

5 beoordelingen

5
2
4
2
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen