100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025 LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS WITH COMPLETE SOLUTIONS

Puntuación
-
Vendido
-
Páginas
26
Grado
A+
Subido en
20-01-2025
Escrito en
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025 LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS WITH COMPLETE SOLUTIONS











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Información del documento

Subido en
20 de enero de 2025
Número de páginas
26
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025
LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS
WITH COMPLETE SOLUTIONS

3DES - CORRECT ANSWER: DES used to encrypt each block three times , each with a
different key

Access Control List - CORRECT ANSWER: info about what kind of access certain
parties are allowed to have to a given system
Read , write , execute

Access Control Models - CORRECT ANSWER: Discretionary ( DAC ) Mandatory
( MAC )
Rule - based
Role - based ( RBAC )
Attribute - based ( ABAC )

Accountability - CORRECT ANSWER: Refers to making sure that a person is
responsible for their actions .
-It provides us with the means to trace activities in our environment back to their source
.
-Depends on identification , authentication , and access control being present so that we
can know who a given transaction is associated with , and what permissions were used
to allow them to carry it out .

Acess Control - CORRECT ANSWER: Allowing - lets us give a particular party access to
a given source
Denying - opposite of gaining access
Limiting - allowing some access to our resource , only up to a certain point
Revoking - takes access away from former user

AES - CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128 bits

Asymmetric cryptography - CORRECT ANSWER: a public key and a private key . The
public key is used to encrypt data sent from the sender to the receiver and is shared
with everyone . Private keys are used to decrypt data that arrives at the receiving end
and are very carefully guarded by the receive ( aka the public key cryptography )

Asymmetric Key Algorithms - CORRECT ANSWER: Secure Sockets Layer ( RSA )
Elliptic Curve Cryptography ( ECC )
Pretty Good Privacy ( PGP )
Transport Layer Security ( TLS )

, Attack Types - CORRECT ANSWER: Interception
Interruption
Modification
Fabrication

Attack types and their effect - CORRECT ANSWER: Interception is the ONLY attack
that affects on confidentiality. Interruption, modification, and fabrication affects
integrity and availability because most of the time they're impacting data.

Attribute - based ( ABAC ) - CORRECT ANSWER: based on attributes , such as of a
person , resource , or an environment

Auditing - CORRECT ANSWER: the examination and review of an organization's
records to ensure accountability through technical means .

Authentication - CORRECT ANSWER: verifying that a person is who they claim to be

Authorization - CORRECT ANSWER: what the user can access , modify , and delete

Availability - CORRECT ANSWER: For one's AUTHORIZED to ACCESS data when
needed

BinScope Binary Analyzer - CORRECT ANSWER: examine
a tool developed by Microsoft to
source code for general good practices

Block Cipher - CORRECT ANSWER: takes a predetermined number of bits , known as a
block , in the plaintext message and encrypts that block

Brute Force - CORRECT ANSWER: an attack by submitting password attempts until
eventually guessed correctly

Buffer overflows - CORRECT ANSWER: a vulnerability that occurs when we do not
properly store the size of the data input into our applications , causing the program to
crash and an attacker to take advantage

Certificates - CORRECT ANSWER: link a public key to a particular individual and are
often used as a form of electronic identification for that particular person

Childrens ' Online Privacy Protection Act (COPPA) - CORRECT ANSWER: sets rules
on data collection for children under 13 to protect their online privacy

CIA Triad - CORRECT ANSWER: Confidential - allowing only those authorized to
access the data requested
Integrity - keeping data unaltered in an unauthorized manner and reliable
Availability - the ability for those authorized to access data when needed

, Compliance - CORRECT ANSWER: conforming to a rule , such as specification , policy
, standard or law

Confidentiality - CORRECT ANSWER: WHO can access the data

Containment - CORRECT ANSWER: involves taking steps to ensure that the situation
does not cause any more damage than it already has , or to at least lessen any ongoing
harm

Cross - Site Scripting ( XSS ) - CORRECT ANSWER: an attack carried out by placing
code in the form of a scripting language into a Web page , or other media , that is
interpreted by a client browser , including Adobe Flash animation and some types of
video files

Cryptography - CORRECT ANSWER: the practice of keeping information secure
through the use of codes and ciphers

DDOS - CORRECT ANSWER: a type of cyber attack where an attacker floods a website
or network with so much traffic that it becomes unavailable to legitimate users .

Deep packet inspection - CORRECT ANSWER: analyzing the actual content of the
traffic that is flowing through them

Defense in-Depth - CORRECT ANSWER: using a variety of security measures that will
still achieve a successful defense should one or more of the defensive measures fail

DES - CORRECT ANSWER: a block cipher based on symmetric key cryptography and
uses a 56 - bit key . Not that secured any more .

Detection and Analysis (Identification) - CORRECT ANSWER: detect the occurrence of
an issue and decide whether or not it is actually an incident so that we can respond
appropriately to it .

Digital Signatures - CORRECT ANSWER: ensure that the message was legitimately sent
by the expected party , and to prevent the sender from denying that he or she sent the
message , known as nonrepudiation

Discretionary ( DAC ) - CORRECT ANSWER: owner of resources determines who gets
access and what level

DMZ - CORRECT ANSWER: a layer of protection that separates a device from the rest of
a network and used to host public facing services such as websites .

Elliptic Curve Cryptography ( ECC ) - CORRECT ANSWER: can secure all browser
connections to the Web servers
$13.79
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
ngunyisteve

Conoce al vendedor

Seller avatar
ngunyisteve Chamberlain College Of Nursing
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
1 año
Número de seguidores
0
Documentos
15
Última venta
-
NGUNYISTEVE

WE ALL KOW STUDYING CAN BE STRESSFUL.WITH VERIFIED AND CORRECT STUDY MATERIAL WE AIM TO MAKE IT SMOOTH AS POSSIBLE.WISHING YOU THE UTMOST SUCCESS

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes