100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D430 Fundamentals of Information Security – PASSED EXAM(239 QUESTIONS AND ANSWERS)

Rating
-
Sold
-
Pages
75
Grade
A
Uploaded on
20-08-2024
Written in
2024/2025

D430 Fundamentals of Information Security – PASSED EXAM(239 QUESTIONS AND ANSWERS)

Institution
WGU D430- Fundamentals Of Information Security
Course
WGU D430- Fundamentals of Information Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430- Fundamentals of Information Security
Course
WGU D430- Fundamentals of Information Security

Document information

Uploaded on
August 20, 2024
Number of pages
75
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D430:
Fundamentals of
Information
Security –
PASSED
EXAM(239
QUESTIONS AND
ANSWERS)
information security - answer "protecting
information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction." - US law

,protection of digital assets.


secure - answer it's difficult to define when you're
truly secure. when you can spot insecurities, you
can take steps to mitigate these issues. although
you'll never get to a truly secure state, you can
take steps in the right direction.


m; as you increase the level of security, you
decrease the level of productivity. the cost of
security should never outstrip the value of what
it's protecting.


data at rest and in motion (and in use) - answer
data at rest is stored data not in the process of
being moved; usually protected with encryption at
the level of the file or the entire storage device.


data in motion is data that is in the process of
being moved; usually protected with encryption,
but in this case the encryption protects the
network protocol or the path of the data.


data in use is the data that is actively being
accessed at the moment. protection includes
permissions and authentication of users. could be
conflated with data in motion.

,defense by layer - answer the layers of your
defense-in-depth strategy will vary depending on
situation and environment.


logical (nonphysical) layers: external network,
network perimeter, internal network, host,
application, and data layers as areas to place your
defenses.


m; defenses for layers can appear in more than one
area. penetration testing, for example, can and
should be used in all layers.


payment card industry data security standard (PCI
DSS) - answer a widely accepted set of policies and
procedures intended to optimize the security of
credit, debit and cash card transactions and
protect cardholders against misuse of their
personal information.


health insurance portability and accountability act
of 1996 (HIPAA) - answer a federal law that
required the creation of national standards to
protect sensitive patient health information from
being disclosed without the patient's consent or
knowledge.

, federal information security management act
(FISMA) - answer requires each federal agency to
develop, document, and implement an information
security program to protect its information and
information systems.


m; applies to US federal government agencies, all
state agencies that administer federal programs,
and private companies that support, sell to, or
receive grant money from the federal government.


federal risk and authorization management
program (FedRAMP) - answer defines rules for
government agencies contracting with cloud
providers; applies to both cloud platform providers
and companies providing software as a service
(SaaS) tools that are based in the cloud.


sarbanes-oxley act (SOX) - answer regulates the
financial practice and governance for publicly held
companies.


m; designed to protect investors and the general
public by establishing requirements regarding
reporting and disclosure practices.


places specific requirements on an organization's
electronic recordkeeping, including the integrity of

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BRAINBOOSTERS Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
666
Member since
2 year
Number of followers
250
Documents
23255
Last sold
1 week ago

In this page you will find all documents , flashcards and package deals offered by seller BRAINBOOSTERS

4.5

341 reviews

5
265
4
30
3
21
2
5
1
20

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions