100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST EXAM 2024 QUESTIONS AND CORRECT ANSWERS |GRADED A+ 100% PASS!

Rating
4.5
(2)
Sold
1
Pages
72
Grade
A+
Uploaded on
29-02-2024
Written in
2023/2024

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST EXAM 2024 QUESTIONS AND CORRECT ANSWERS |GRADED A+ 100% PASS!

Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Document information

Uploaded on
February 29, 2024
Number of pages
72
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST
EXAM 2024 QUESTIONS AND CORRECT ANSWERS
|GRADED A+ 100% PASS!




Possession - ANSWER-Do you physically have the data in question?
Used to describe the scope of a loss


Identify the four types of attacks - ANSWER-interception,
interruption, modification, and fabrication


Interception attacks - ANSWER-Make your assets unusable or
unavailable


Interruption attacks - ANSWER-cause assets to become unusable or
unavailable for our use, on a temporary or permanent basis


Modification attacks - ANSWER-Tampering with an asset


Fabrication attacks - ANSWER-Generating data, process, and
communications


Define the risk management process - ANSWER-1. Identify assets

,2. Identify threats
3. Assess vulnerabilities
4. Assess risks
5. Mitigate risks


Define the incident response process and its stages. - ANSWER-
Preparation
Detection and analysis
Containment
Eradication
Recovery


Preparation in incident response - ANSWER-creating policies and
procedures


Detection in incident response - ANSWER-Using tools and humans to
decide if an incident is an incident


Defense in Depth - ANSWER-employing multiple layers of controls to
avoid a single point of failure


Identify types of controls to mitigate risk - ANSWER-physical, logical,
administrative

,Identify elements of risk management in policies and procedures. -
ANSWER-Development of robust policies
Identification of emergent recent
Identify elements of internal weakness


Identify the layers of a defense-in-depth strategy. - ANSWER-External
network
Internal network
Host
Application
Data


Define identification - ANSWER-The claim of who we/networks are
Define the confidentiality in the CIA triad. - ANSWER-Our ability to
protect data from those who are not authorized to view it.


Examples of confidentiality - ANSWER-A patron using an ATM card
wants to keep their PIN number confidential.
An ATM owner wants to keep bank account numbers confidential.


How can confidentiality be broken? - ANSWER-Losing a laptop
An attacker gets access to info
A person can look over your shoulder

, Define integrity in the CIA triad. - ANSWER-The ability to prevent
people from changing your data and the ability to reverse unwanted
changes.


How do you control integrity? - ANSWER-Permissions restrict what
users can do (read, write, etc.)


Examples of integrity - ANSWER-Data used by a doctor to make
medical decisions needs to be correct or the patient can die.


Define the availability in the CIA triad. - ANSWER-Our data needs to
be accessible when we need it.


How can availability be broken? - ANSWER-Loss of power, application
problems. If caused by an attacker, this is a Denial of Service attack.


Define information security. - ANSWER-The protection of information
and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide
confidentiality, integrity, and availability.


Define the Parkerian Hexad and its principles. - ANSWER-The
Parkerian Hexad includes confidentiality, integrity, and availability
from the CIA triad. It also includes possession (or control),
authenticity, and utility.

Reviews from verified buyers

Showing all 2 reviews
1 year ago

1 year ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bestnursesteve Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
470
Member since
1 year
Number of followers
58
Documents
4938
Last sold
2 hours ago
TEACH ME TO

TEACH ME TO I HEIP STUDENTS WITH ALL TYPE OF EXAMZ LIKE NGN,ATI,HESI,PN COMPREHENSION., FIREFIGHTER ,ECONOMICS .ENGLISH,SPANISH.MATHEMATICS .......TO SCORE A+ AND ALSO TO ASSIST IN ANY EXAM POSSIBLE

4.8

1494 reviews

5
1348
4
84
3
24
2
11
1
27

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions