100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 Fundamentals of Information Security Exam Reviewed Questions and Answers Latest 2025/2026 GRADED A+

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
29-03-2025
Written in
2024/2025

WGU D430 Fundamentals of Information Security Exam Reviewed Questions and Answers Latest 2025/2026 GRADED A+ WGU D430 Fundamentals of Information Security Exam Reviewed Questions and Answers Latest 2025/2026 GRADED A+ WGU D430 Fundamentals of Information Security Exam Reviewed Questions and Answers Latest 2025/2026 GRADED A+

Show more Read less
Institution
WGU D430
Course
WGU D430









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430
Course
WGU D430

Document information

Uploaded on
March 29, 2025
Number of pages
12
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D430 Fundamentals of Information
Security Exam Reviewed Questions and
Answers Latest 2025/2026 GRADED A+




Define the confidentiality in the CIA triad. - CORRECT ANSWER-Our ability to protect
data from those who are not authorized to view it.



Examples of confidentiality - CORRECT ANSWER-A patron using an ATM card wants
to keep their PIN number confidential.

An ATM owner wants to keep bank account numbers confidential.



How can confidentiality be broken? - CORRECT ANSWER-Losing a laptop

An attacker gets access to info

A person can look over your shoulder



Define integrity in the CIA triad. - CORRECT ANSWER-The ability to prevent people
from changing your data and the ability to reverse unwanted changes.



How do you control integrity? - CORRECT ANSWER-Permissions restrict what users
can do (read, write, etc.)

, Examples of integrity - CORRECT ANSWER-Data used by a doctor to make medical
decisions needs to be correct or the patient can die.



Define the availability in the CIA triad. - CORRECT ANSWER-Our data needs to be
accessible when we need it.



How can availability be broken? - CORRECT ANSWER-Loss of power, application
problems. If caused by an attacker, this is a Denial of Service attack.



Define information security. - CORRECT ANSWER-The protection of information and
information systems from unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide confidentiality, integrity, and
availability.



Define the Parkerian Hexad and its principles. - CORRECT ANSWER-The Parkerian
Hexad includes confidentiality, integrity, and availability from the CIA triad. It also
includes possession (or control), authenticity, and utility.



Authenticity - CORRECT ANSWER-Whether the data in question comes from who or
where it says it comes from (i.e. did this person actually send this email?)



Confidentiality is affected by what type of attack? - CORRECT ANSWER-Interception
(eaves dropping)



Integrity is affected by what type of attacks? - CORRECT ANSWER-Interruption (assets
are unusable), modification (tampering with an asset), fabrication (generating false
data)



Authenticity is affected by what type of attacks? - CORRECT ANSWER-Interruption
(assets are unusable), modification (tampering with an asset), fabrication (generating
false data)
$11.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
LectAnonymous

Get to know the seller

Seller avatar
LectAnonymous
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
9 months
Number of followers
0
Documents
62
Last sold
9 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions