100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D430- FUNDAMENTALS OF INFORMATION SECURITY EXAM LATEST 2024/2025 UPDATE ( COMPLETE Q&A 100% SOLVED)

Beoordeling
-
Verkocht
-
Pagina's
85
Cijfer
A+
Geüpload op
15-11-2024
Geschreven in
2024/2025

WGU D430- FUNDAMENTALS OF INFORMATION SECURITY EXAM LATEST 2024/2025 UPDATE ( COMPLETE Q&A 100% SOLVED)












Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
15 november 2024
Aantal pagina's
85
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY MIDTERM EXAM RATIONALE Q&A
2024/2025
Access Control List –

CORRECT ANSWER: info about what kind of access certainparties are

allowed to have to a given system

Read , write , execute



Access Control Models –

CORRECT ANSWER: Discretionary ( DAC )Mandatory ( MAC )

Rule - based

Role - based ( RBAC )

Attribute - based ( ABAC )



Accountability –

CORRECT ANSWER:

Refers to making sure that a person isresponsible for their actions .

-It provides us with the means to trace activities in our environment back to their

source

-Depends on identification , authentication , and access control being present so

that wecan know who a given transaction is associated with , and what

permissions were used to allow them to carry it out .




about:blank 1/85

, Acess Control –

CORRECT ANSWER: Allowing - lets us give a particular party accessto a given

source

Denying - opposite of gaining access

Limiting - allowing some access to our resource , only up to a certain point

Revoking - takes access away from former user



AES –

CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one

with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128

bits



Asymmetric cryptography –

CORRECT ANSWER: a public key and a private key . Thepublic key is used to

encrypt data sent from the sender to the receiver and is shared with everyone .

Private keys are used to decrypt data that arrives at the receiving end and are

very carefully guarded by the receive ( aka the public key cryptography )



Asymmetric Key Algorithms –

CORRECT ANSWER:

Secure Sockets Layer ( RSA )Elliptic Curve Cryptography ( ECC )

Pretty Good Privacy ( PGP )

Transport Layer Security (

TLS )

Attack Types –




about:blank 2/85

, CORRECT ANSWER: InterceptionInterruption

Modification

Fabrication



Attack types and their effect –

CORRECT ANSWER: Interception is the ONLY attack that affects on

confidentiality. Interruption, modification, and fabrication affects integrityand

availability because most of the time they're impacting data.



Attribute - based ( ABAC )

- CORRECT ANSWER: based on attributes , such as of aperson , resource , or

an environment



Auditing –

CORRECT ANSWER: the examination and review of an organization's

records to ensure accountability through technical means .



Authentication –

CORRECT ANSWER: verifying that a person is who they claim to be



Authorization –

CORRECT ANSWER: what the user can access , modify , and delete



Availability –

CORRECT ANSWER: For one's AUTHORIZED to ACCESS data whenneeded




about:blank 3/85

, BinScope Binary Analyzer –

CORRECT ANSWER: a tool developed by Microsoft toexamine source code

for general good practices



Block Cipher –

CORRECT ANSWER: takes a predetermined number of bits , known asa block , in the

plaintext message and encrypts that block



Brute Force –

CORRECT ANSWER: an attack by submitting password attempts untileventually

guessed correctly



Buffer overflows –

CORRECT ANSWER:

a vulnerability that occurs when we do not properly store the size of the data input

into our applications , causing the program tocrash and an attacker to take

advantage



Certificates –

CORRECT ANSWER: link a public key to a particular individual and areoften used

as a form of electronic identification for that particular person



Childrens ' Online Privacy Protection Act (COPPA) –

CORRECT ANSWER: sets ruleson data collection for children under 13 to

protect their online privacy




about:blank 4/85

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Edumax Johns Hopkins University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
50
Lid sinds
1 jaar
Aantal volgers
3
Documenten
1286
Laatst verkocht
4 dagen geleden
EDUMAX SOLUTIONS

3.8

5 beoordelingen

5
2
4
1
3
1
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen