100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 Assessment Fundamentals of Information Security Exam with Questions and Verified Rationalized Answers Updated 2025/2026

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

WGU D430 assessment Information security exam WGU D430 exam questions Verified answers for WGU D430 WGU information security test Fundamentals of Information Security WGU D430 exam preparation WGU D430 questions and answers Information security assessment WGU Pass WGU D430 exam Study guide for D430 WGU WGU D430 exam practice Rationalized answers D430 Information security fundamentals exam D430 test questions WGU Prepare for WGU information security exam WGU information security test WGU exam questions and answers WGU information security certification WGU D430 study materials Information security fundamentals test prep D430 verified answers WGU Download WGU D430 exam Online WGU D430 test Information security exam guide WGU exam preparation D430 information security WGU

Show more Read less
Institution
WGU D430
Course
WGU D430









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430
Course
WGU D430

Document information

Uploaded on
December 20, 2024
Number of pages
15
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d430 assessment
  • d430 information

Content preview

WGU D430 Assessment Fundamentals of Information Security
Exam with Questions and Verified Rationalized Answers
Updated 2025/2026




1. CIATriad:Confidential - allowing only those authorized to access the data re- quested
i i i i i i i i i i i i i




Integrity - keeping data unaltered in an unauthorized manner and reliable Availability -
i i i i i i i i i i i i




i the ability for those authorized to access data when needed
i i i i i i i i i




2. Parkerian Hexad: Confidentiality Integrity Availability i i i i




Possession - physical deposition of the media on which the data is stored Authenticity-
i i i i i i i i i i i i i i




allowsustotalkabouttheproperattributionastotheownerorcreator of the data in question
i i i i i i i i i i i i i i i i i i i




Utility - how useful the data is to us
i i i i i i i i




3. AttackTypes:Interception Int i i i




erruption
Modification Fabrication i




4. Interception: an attacker has access to data , applications or environment i i i i i i i i i i




5. Interruption: attacks cause our assets to become unusable or unavailable i i i i i i i i i




6. Modification:attacks involve tampering with our asset i i i i i i




7. Fabrication:attacks that create false information i i i i i




8. Threat: something that has potential to cause harm
i i i i i i i




9. Vulnerability: weaknesses that can be used to harm us i i i i i i i i




10. Something you know: username , password , PIN i i i i i i i




11. Something you have: ID badge , swipe card , OTP i i i i i i i i i



1i/i
15

, 12. Something you are: fingerprint, Iris Retina scan i i i i i i




13. Somewhere you are:geolocation i i i




14. Something you do: handwriting , typing , walking i i i i i i i




15. Authentication: verifying that a person is who they claim to be i i i i i i i i i i




16. Mutual authentication: Bothparties in atransactiontoauthenticate eachother
i i i i i i i i i i




- Has digital certificates
i i




- Prevents man in the middle attacks i i i i i




- The man in the middle is where the attacker inserts themselves into the traffic flow
i i i i i i i i i i i i i i




- Ex .Both the PC and server authenticate each other before data is sent in either direction
i i i i i i i i i i i i i i i i




17. Risk management process:1.Identify Asset -
i i i i i i




iidentifying and categorizing assets that we're protecting
i i i i i i




2. IdentifyThreats - identify threats
i i i i




3. AssessVulnerabilities - look for impacts
i i i i i




4. Assess Risk - asses the risk overall
i i i i i i




5. Mitigate Risk - ensure that a given type of threat is accounted for
i i i i i i i i i i i i




18. Incident response process:Preparation Detection and Analysis Identifica
i i i i i i i




tion




2i/i
15

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Excelsolutions Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
557
Member since
1 year
Number of followers
12
Documents
4591
Last sold
19 hours ago
EXCELSOLUTIONS

On this page you will find all documents, Package deals, Test Banks, Solution manuals, WGU, ATI, HESI, ETC........ Always leave a review after purchasing any document so as to make sure our Customers are 100% Satisfied. ALL THE BEST!!!!!!!!!!!!!!!!!!!

3.7

109 reviews

5
46
4
18
3
25
2
6
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions