100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS ANDCORRECT DETAILED ANSWERS/A+ GRADE

Puntuación
-
Vendido
-
Páginas
85
Grado
A+
Subido en
07-12-2025
Escrito en
2025/2026

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS ANDCORRECT DETAILED ANSWERS/A+ GRADEAccess Control List – CORRECT ANSWER: info about what kind of access certainparties are allowed to have to a given system Read , write , execute Access Control Models – CORRECT ANSWER: Discretionary ( DAC )Mandatory ( MAC ) Rule - based Role - based ( RBAC ) Attribute - based ( ABAC ) Accountability – CORRECT ANSWER: Refers to making sure that a person isresponsible for their actions . -It provides us with the means to trace activities in our environment back to their source -Depends on identification , authentication , and access control being present so that wecan know who a given transaction is associated with , and what permissions were used to allow them to carry it out . 8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…about:blank 2/85 Acess Control – CORRECT ANSWER: Allowing - lets us give a particular party accessto a given source Denying - opposite of gaining access Limiting - allowing some access to our resource , only up to a certain point Revoking - takes access away from former user AES – CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128 bits Asymmetric cryptography – CORRECT ANSWER: a public key and a private key . Thepublic key is used to encrypt data sent from the sender to the receiver and is shared with everyone . Private keys are used to decrypt data that arrives at the receiving end and are very carefully guarded by the receive ( aka the public key cryptography ) Asymmetric Key Algorithms – CORRECT ANSWER: Secure Sockets Layer ( RSA )Elliptic Curve Cryptography ( ECC ) Pretty Good Privacy ( PGP ) Transport Layer Security ( TLS ) Attack Types – 8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…about:blank 3/85 CORRECT ANSWER: InterceptionInterruption Modification Fabrication Attack types and their effect – CORRECT ANSWER: Interception is the ONLY attack that affects on confidentiality. Interruption, modification, and fabrication affects integrityand availability because most of the time they're impacting data. Attribute - based ( ABAC ) - CORRECT ANSWER: based on attributes , such as of aperson , resource , or an environment Auditing – CORRECT ANSWER: the examination and review of an organization's records to ensure accountability through technical means . Authentication – CORRECT ANSWER: verifying that a person is who they claim to be Authorization – CORRECT ANSWER: what the user can access , modify , and delete Availability – CORRECT ANSWER: For one's AUTHORIZED to ACCESS data whenneeded

Mostrar más Leer menos
Institución
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Grado
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Grado
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Información del documento

Subido en
7 de diciembre de 2025
Número de páginas
85
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…




WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024/ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETAILED ANSWERS/A+ GRADE

WGU D430 FINAL EXAM

Access Control List –

CORRECT ANSWER: info about what kind of access certainparties are

allowed to have to a given system

Read , write , execute



Access Control Models –

CORRECT ANSWER: Discretionary ( DAC )Mandatory ( MAC )

Rule - based

Role - based ( RBAC )

Attribute - based ( ABAC )



Accountability –

CORRECT ANSWER:

Refers to making sure that a person isresponsible for their actions .

-It provides us with the means to trace activities in our environment back to their

source

-Depends on identification , authentication , and access control being present so

that wecan know who a given transaction is associated with , and what

permissions were used to allow them to carry it out .




about:blank 1/85

,8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…




Acess Control –

CORRECT ANSWER: Allowing - lets us give a particular party accessto a given

source

Denying - opposite of gaining access

Limiting - allowing some access to our resource , only up to a certain point

Revoking - takes access away from former user



AES –

CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one

with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128

bits



Asymmetric cryptography –

CORRECT ANSWER: a public key and a private key . Thepublic key is used to

encrypt data sent from the sender to the receiver and is shared with everyone .

Private keys are used to decrypt data that arrives at the receiving end and are

very carefully guarded by the receive ( aka the public key cryptography )



Asymmetric Key Algorithms –

CORRECT ANSWER:

Secure Sockets Layer ( RSA )Elliptic Curve Cryptography ( ECC )

Pretty Good Privacy ( PGP )

Transport Layer Security (

TLS )

Attack Types –




about:blank 2/85

,8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…




CORRECT ANSWER: InterceptionInterruption

Modification

Fabrication



Attack types and their effect –

CORRECT ANSWER: Interception is the ONLY attack that affects on

confidentiality. Interruption, modification, and fabrication affects integrityand

availability because most of the time they're impacting data.



Attribute - based ( ABAC )

- CORRECT ANSWER: based on attributes , such as of aperson , resource , or

an environment



Auditing –

CORRECT ANSWER: the examination and review of an organization's

records to ensure accountability through technical means .



Authentication –

CORRECT ANSWER: verifying that a person is who they claim to be



Authorization –

CORRECT ANSWER: what the user can access , modify , and delete



Availability –

CORRECT ANSWER: For one's AUTHORIZED to ACCESS data whenneeded




about:blank 3/85

, 8/27/24, 8:16 AM WGU D430 fundamentals of information security Exam Latest Update 2024 2…




BinScope Binary Analyzer –

CORRECT ANSWER: a tool developed by Microsoft toexamine source code

for general good practices



Block Cipher –

CORRECT ANSWER: takes a predetermined number of bits , known asa block , in the

plaintext message and encrypts that block



Brute Force –

CORRECT ANSWER: an attack by submitting password attempts untileventually

guessed correctly



Buffer overflows –

CORRECT ANSWER:

a vulnerability that occurs when we do not properly store the size of the data input

into our applications , causing the program tocrash and an attacker to take

advantage



Certificates –

CORRECT ANSWER: link a public key to a particular individual and areoften used

as a form of electronic identification for that particular person



Childrens ' Online Privacy Protection Act (COPPA) –

CORRECT ANSWER: sets ruleson data collection for children under 13 to

protect their online privacy




about:blank 4/85
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Onlystudents West Virgina University
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
108
Miembro desde
3 año
Número de seguidores
86
Documentos
1357
Última venta
1 mes hace
Onlystudents store.

BEST SELLER CENTER Welcome All to this page. Here you will find ; ALL DOCUMENTS, PACKAGE DEALS, FLASHCARDS AND 100% REVISED & CORRECT STUDY MATERIALS GUARANTEED A+. NB: ALWAYS WRITE A GOOD REVIEW WHEN YOU FIND MY DOCUMENTS HELPFUL TO YOU. ALSO, REFER YOUR COLLEGUES TO MY ACCOUNT. ( Refer 3 and get 1 free document). I'M ALWALYS AVAILABLE TO SERVE YOU ANY TIME. WISHING YOU SUCCESS IN YOUR STUDIES. THANK YOU.

Lee mas Leer menos
4.0

20 reseñas

5
12
4
4
3
0
2
0
1
4

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes