100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU D430- Fundamentals of Information Security EXAM 2025 (Actual Exam) Questions with verified Answers (Latest Update 2025) UPDATE!!

Puntuación
-
Vendido
-
Páginas
28
Grado
A+
Subido en
19-10-2025
Escrito en
2025/2026

WGU D430- Fundamentals of Information Security EXAM 2025 (Actual Exam) Questions with verified Answers (Latest Update 2025) UPDATE!!

Institución
WGU D430- Fundamentals Of Information Security
Grado
WGU D430- Fundamentals of Information Security










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D430- Fundamentals of Information Security
Grado
WGU D430- Fundamentals of Information Security

Información del documento

Subido en
19 de octubre de 2025
Número de páginas
28
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D430 fundamentals of information security

1. Information se- protecting data, software, and hardware secure against unauthorized access, use,
curity disclosure, disruption, modification, or destruction.

2. Compliance The requirements that are set forth by laws and industry regulations.

IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal
government agencies

3. DAD Triad Disclosure, alteration, and denial

4. CIA Triad The core model of all information security concepts. Confidential, integrity and
availability

5. Confidential Ability to protect our data from those who are not authorized to view it.

6. What ways can - lose a personal laptop with data
confidentiality be - Person can view your password you are entering in
compromised? - Send an email attachment to the wrong person.
- Attacker can penetrate your systems....etc.

7. integrity Keeping data unaltered by accidental or malicious intent

8. How to maintain Prevent unauthorized changes to the data and the ability to reverse unwanted
integrity? authorized changes.

Via system/file permissions or Undo/Roll back undesirable changes.

9. Availability The ability to access data when needed

10. Ways Availability - Power loss
can be compro- - Application issues
mised - Network attacks
- System compromised (DoS)




, WGU D430 fundamentals of information security

11. Denial of Service Security problem in which users are not able to access an information system; can
(DoS) be caused by human errors, natural disaster, or malicious activity.

12. Parkerian hexad A model that adds three more principles to the CIA triad:
model
Possession/Control
Utility
Authenticity




13. Possession/ con- Refers to the physical disposition of the media on which the data is stored; This
trol allows you to discuss loss of data via its physical medium.

14. Principle of Pos- Lost package (encrypted USB's and unencrypted USB's)
session example
possession is an issue because the tapes are physically lost.

(Unencrypted is compromised via confidentiality and possession; encrypted is
compromised only via possession).

15. Principle of Au- Allows you to say whether you've attributed the data in question to the proper
thenticity owner/creator.

16. Ways authentici- Sending an email but altering the message to look like it came from someone
ty can be com- else, than the original one that was sent.
promised

17. Utility How useful the data is to you.

Ex. Unencrypted (a lot of utility) Encrypted (little utility).


, WGU D430 fundamentals of information security


18. Security Attacks Broken down from the type of attack, risk the attack represents, and controls you
might use to mitigate it.

19. Types of attacks 1- interception
2- interruption
3- modification
4- fabrication

20. Interception Attacks allows unauthorized users to access our data, applications, or environ-
ments.

Primarily an attack against confidentiality

21. Interception At- Unauthorized file viewing, copying, eavesdropping on phone conversations, read-
tack Examples ing someone's emails.

22. Interruption Attacks cause our assets to become unstable or unavailable for our use, on a
temporary or permanent basis.

This attack affects availability but can also attack integrity

23. Interruption At- DoS attack on a mail server; availability attack
tack Examples
Attacker manipulates the processes on which a database runs to prevent access;
integrity attack.

Could also be a combo of both.

24. Modification Attacks involve tampering with our asset.

Such attacks might primarily be considered an integrity attack, but could also be
an availability attack.

25.
$14.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
CodedNurse Nightingale College
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
3796
Miembro desde
1 año
Número de seguidores
20
Documentos
8755
Última venta
3 días hace
coded

"I specialize in key academic areas such as Psychology, Nursing, Human Resource Management, and Mathematics. Providing students with top-quality work is my priority, and I always uphold the highest scholarly standards. This commitment has earned me the distinction of being a Gold-Rated Tutor on Stuvia. You can trust my work to help you achieve excellent grades!"

3.4

65 reseñas

5
18
4
16
3
15
2
3
1
13

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes