5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
WGUjD430j FUNDAMENTALSj OFj INFORMATIONjSE
CURITYjFINALjEXAMjANDj PRACTICEj EXAMj2024/A
CTUALjEXAMSj WITHj 500j QUESTIONSjAND
CORRECTj DETAILEDjANSWERS/A+j GRADEjWG
UjD430jFINALjEXAM
Accessj Controlj Listj –
CORRECTjANSWER:j infoj aboutj whatj kindj ofj accessj certainpartiesj arejallowed
jtojhavejtojajgivenjsystem
Readj,j writej,jexecute
Accessj Controlj Modelsj –
CORRECTjANSWER:j Discretionaryj (j DACj )Mandatoryj (j MACj )jRulej
-jbased
Rolej -jbasedj(jRBACj)
Attributej-j basedj(jABACj)
Accountabilityj –
CORRECTjANSWER:
Refersj toj makingj surej thatjaj personj isresponsiblej forj theirj actionsj .
-Itj providesj usjwithjthej meansj toj tracej activitiesj inj ourj environmentj backj toj their
source
-
Dependsj onjidentificationj ,j authenticationj ,j andj accessj controlj beingj presentj sojthat
j wecanjknowj whoj aj givenj transactionj isj associatedj withj ,j andj what
permissionsj werej usedj toj allowj themj tojcarryj itj outj .
about:blank 1/85
,5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
Acessj Controlj –
CORRECTjANSWER:j Allowingj -
j letsj usj givej aj particularj partyj accesstoj aj givenjsource
Denyingj -j oppositej ofj gainingj access
Limitingj-jallowingj somejaccessj tojourjresourcej ,j onlyj upjtoj aj certainjpoint
Revokingj -j takesj accessj awayj fromj formerj user
AESj–
CORRECTjANSWER:jusesjthreejdifferentjciphersj:jonejwithjaj128j-
jbitjkeyj,jonej withjaj192j-jbitjkeyj,jandjonejwithjaj256j-
jbitjkeyj,jalljhavingjajblockjlengthjofj128jbits
Asymmetricj cryptographyj –
CORRECTjANSWER:j aj publicj keyj andj aj privatej keyj .jThepublicj keyjisj usedj tojenc
ryptj dataj sentj fromj thej senderj toj thej receiverj andj isj sharedj withj everyonej .jPrivatej
keysj arejusedj toj decryptj datajthatjarrivesj atj thejreceivingj endj andj arejveryj carefull
yjguardedjbyjthejreceivej (jakajthejpublicj keyjcryptographyj)
Asymmetricj KeyjAlgorithmsj –
CORRECTjANSWER:
Securej Socketsj Layerj (j RSAj)Ellipticj Curvej Cryptographyj (j ECCj )jPr
ettyjGoodjPrivacyj(jPGPj)
TransportjLayerjSecurityj(j
TLSj)
AttackjTypesj–
about:blank 2/85
,5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
CORRECTjANSWER:j InterceptionInterruptionjModification
Fabrication
Attackjtypesj andj theirj effectj –
CORRECTjANSWER:jInterceptionjisjthejONLYjattackj thatjaffectsjonjconfidentia
lity.j Interruption,j modification,j andjfabricationj affectsj integrityandjavailabilityjbec
ausejmostjofjthejtimejthey'rejimpactingjdata.
Attributej-j basedj (jABACj )
-
j CORRECTjANSWER:j basedj onj attributesj ,j suchj asj ofj apersonj ,j resourcej ,j orjanje
nvironment
Auditingj –
CORRECTjANSWER:j thej examinationj andj reviewj ofj anj organization'sjrecordsjt
oj ensurejaccountabilityj throughjtechnicaljmeansj.
Authenticationj –
CORRECTjANSWER:j verifyingj thatj aj personj isj whoj theyj claimj toj be
Authorizationj –
CORRECTjANSWER:j whatj thej userj canjaccessj ,jmodifyj,j andj delete
Availabilityj –
CORRECTjANSWER:j Forj one'sjAUTHORIZEDj tojACCESSj dataj whenneeded
about:blank 3/85
, 5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
BinScopej BinaryjAnalyzerj –
CORRECTjANSWER:j aj toolj developedj byj Microsoftj toexaminej sourcej codejfor
jgeneraljgoodjpractices
Blockj Cipherj–
CORRECTjANSWER:j takesj aj predeterminedj numberj ofj bitsj ,j knownjasaj blockj ,jinj thejplai
ntextj messagejandjencryptsjthatj block
Brutej Forcej –
CORRECTjANSWER:j anj attackj byj submittingj passwordj attemptsj untileventuallyjgues
sedjcorrectly
Bufferj overflowsj –
CORRECTjANSWER:
aj vulnerabilityj thatj occursj whenj wej doj notj properlyj storej thej sizejofj thej dataj inputjintoj
ourjapplicationsj,jcausingjthejprogramjtocrashjandjanjattackerjtojtake
advantage
Certificatesj –
CORRECTjANSWER:j linkj aj publicj keyj tojaj particularj individualj andj areoftenj used
asj aj formjofj electronicj identificationj forj thatj particularjperson
Childrensj 'j Onlinej Privacyj ProtectionjActj (COPPA)j –
CORRECTjANSWER:j setsj rulesonj dataj collectionj forj childrenj underj 13j tojpr
otectjtheirjonlinejprivacy
about:blank 4/85
WGUjD430j FUNDAMENTALSj OFj INFORMATIONjSE
CURITYjFINALjEXAMjANDj PRACTICEj EXAMj2024/A
CTUALjEXAMSj WITHj 500j QUESTIONSjAND
CORRECTj DETAILEDjANSWERS/A+j GRADEjWG
UjD430jFINALjEXAM
Accessj Controlj Listj –
CORRECTjANSWER:j infoj aboutj whatj kindj ofj accessj certainpartiesj arejallowed
jtojhavejtojajgivenjsystem
Readj,j writej,jexecute
Accessj Controlj Modelsj –
CORRECTjANSWER:j Discretionaryj (j DACj )Mandatoryj (j MACj )jRulej
-jbased
Rolej -jbasedj(jRBACj)
Attributej-j basedj(jABACj)
Accountabilityj –
CORRECTjANSWER:
Refersj toj makingj surej thatjaj personj isresponsiblej forj theirj actionsj .
-Itj providesj usjwithjthej meansj toj tracej activitiesj inj ourj environmentj backj toj their
source
-
Dependsj onjidentificationj ,j authenticationj ,j andj accessj controlj beingj presentj sojthat
j wecanjknowj whoj aj givenj transactionj isj associatedj withj ,j andj what
permissionsj werej usedj toj allowj themj tojcarryj itj outj .
about:blank 1/85
,5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
Acessj Controlj –
CORRECTjANSWER:j Allowingj -
j letsj usj givej aj particularj partyj accesstoj aj givenjsource
Denyingj -j oppositej ofj gainingj access
Limitingj-jallowingj somejaccessj tojourjresourcej ,j onlyj upjtoj aj certainjpoint
Revokingj -j takesj accessj awayj fromj formerj user
AESj–
CORRECTjANSWER:jusesjthreejdifferentjciphersj:jonejwithjaj128j-
jbitjkeyj,jonej withjaj192j-jbitjkeyj,jandjonejwithjaj256j-
jbitjkeyj,jalljhavingjajblockjlengthjofj128jbits
Asymmetricj cryptographyj –
CORRECTjANSWER:j aj publicj keyj andj aj privatej keyj .jThepublicj keyjisj usedj tojenc
ryptj dataj sentj fromj thej senderj toj thej receiverj andj isj sharedj withj everyonej .jPrivatej
keysj arejusedj toj decryptj datajthatjarrivesj atj thejreceivingj endj andj arejveryj carefull
yjguardedjbyjthejreceivej (jakajthejpublicj keyjcryptographyj)
Asymmetricj KeyjAlgorithmsj –
CORRECTjANSWER:
Securej Socketsj Layerj (j RSAj)Ellipticj Curvej Cryptographyj (j ECCj )jPr
ettyjGoodjPrivacyj(jPGPj)
TransportjLayerjSecurityj(j
TLSj)
AttackjTypesj–
about:blank 2/85
,5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
CORRECTjANSWER:j InterceptionInterruptionjModification
Fabrication
Attackjtypesj andj theirj effectj –
CORRECTjANSWER:jInterceptionjisjthejONLYjattackj thatjaffectsjonjconfidentia
lity.j Interruption,j modification,j andjfabricationj affectsj integrityandjavailabilityjbec
ausejmostjofjthejtimejthey'rejimpactingjdata.
Attributej-j basedj (jABACj )
-
j CORRECTjANSWER:j basedj onj attributesj ,j suchj asj ofj apersonj ,j resourcej ,j orjanje
nvironment
Auditingj –
CORRECTjANSWER:j thej examinationj andj reviewj ofj anj organization'sjrecordsjt
oj ensurejaccountabilityj throughjtechnicaljmeansj.
Authenticationj –
CORRECTjANSWER:j verifyingj thatj aj personj isj whoj theyj claimj toj be
Authorizationj –
CORRECTjANSWER:j whatj thej userj canjaccessj ,jmodifyj,j andj delete
Availabilityj –
CORRECTjANSWER:j Forj one'sjAUTHORIZEDj tojACCESSj dataj whenneeded
about:blank 3/85
, 5/7/24,j3:16jPM WGUjD430jfundamentalsjofjinformationjsecurityjExamjLatestjUpdatej2024j2…
BinScopej BinaryjAnalyzerj –
CORRECTjANSWER:j aj toolj developedj byj Microsoftj toexaminej sourcej codejfor
jgeneraljgoodjpractices
Blockj Cipherj–
CORRECTjANSWER:j takesj aj predeterminedj numberj ofj bitsj ,j knownjasaj blockj ,jinj thejplai
ntextj messagejandjencryptsjthatj block
Brutej Forcej –
CORRECTjANSWER:j anj attackj byj submittingj passwordj attemptsj untileventuallyjgues
sedjcorrectly
Bufferj overflowsj –
CORRECTjANSWER:
aj vulnerabilityj thatj occursj whenj wej doj notj properlyj storej thej sizejofj thej dataj inputjintoj
ourjapplicationsj,jcausingjthejprogramjtocrashjandjanjattackerjtojtake
advantage
Certificatesj –
CORRECTjANSWER:j linkj aj publicj keyj tojaj particularj individualj andj areoftenj used
asj aj formjofj electronicj identificationj forj thatj particularjperson
Childrensj 'j Onlinej Privacyj ProtectionjActj (COPPA)j –
CORRECTjANSWER:j setsj rulesonj dataj collectionj forj childrenj underj 13j tojpr
otectjtheirjonlinejprivacy
about:blank 4/85