100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

(2025/2026) Assessment for WGU D430 fundamentals of information security Exam with Questions and Verified Rationalized Answers 100% Pass Score

Rating
-
Sold
-
Pages
37
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

WGU D430 exam prep information security fundamentals test D430 exam questions WGU information security exam answers D430 exam rationalized answers WGU D430 study guide information security practice test WGU exam preparation resources D430 fundamentals exam information security exam assistance WGU fundamental security questions verified answers for D430 D430 test preparation information security D430 assessment WGU security exam help D430 exam review questions WGU certified exam answers information security assessment guide D430 fundamentals course help WGU security test answers D430 practice exam information security D430 questions WGU D430 verified answers fundamentals of info security test D430 exam strategy WGU assessment exam questions information security exam guide information security fundamentals test D430 exam questions WGU information security exam answers D430 exam rationalized answers WGU D430 study guide information security practice test WGU exam preparation resources D430 fundamentals exam information security exam assistance WGU fundamental security questions verified answers for D430 D430 test preparation information security D430 assessment WGU security exam help D430 exam review questions WGU certified exam answers information security assessment guide D430 fundamentals course help WGU security test answers D430 practice exam information security D430 questions WGU D430 verified answers fundamentals of info security test D430 exam strategy WGU assessment exam questions information security exam guide

Show more Read less
Institution
WGU D430
Course
WGU D430











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430
Course
WGU D430

Document information

Uploaded on
December 20, 2024
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d430 exam prep

Content preview

(2025/2026) Assessment for WGU D430
fundamentals of information security Exam
with Questions and Verified Rationalized Answers 100% Pass Score




1. Information security: protecting data, software, and hardware secure against unauthor
v v v v v v v v v



ized access, use, disclosure, disruption, modification, or destruction.
v v v v v v v



2. Compliance: The requirements that are set forth by laws and industry regula- tions.
v v v v v v v v v v v v




IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA-
v v v v v v v v



federal government agencies
v v v



3. DAD Triad: Disclosure, alteration, and denial
v v v v v



4. CIA Triad: The core model of all information security concepts. Confidential, integrity
v v v v v v v v v v v v



and availability
v



5. Confidential: Ability to protect our data from those who are not authorized to view it.
v v v v v v v v v v v v v v



6. What ways can confidentiality be compromised?: - lose a personal laptop with data
v v v v v v v v v v v v



- Person can view your password you are entering in
v v v v v v v v



- Send an email attachment to the wrong person.
v v v v v v v



- Attacker can penetrate your systems.......... etc.
v v v v



7. integrity: Keeping data unaltered by accidental or malicious intent
v v v v v v v v



8. How to maintain integrity?: Prevent unauthorized changes to the data and the ability to r
v v v v v v v v v v v v v v



everse unwanted authorized changes.
v v v




Via system/file permissions or Undo/Roll back undesirable changes.
v v v v v v v




1v/v37

,9. Availability: The ability to access data when needed
v v v v v v v



10. Ways Availability can be compromised: - Power loss
v v v v v v v



- Application issues v



- Network attacks v



- System compromised (DoS)
v v



11. Denial of Service (DoS): Security problem in which users are not able to access an inform
v v v v v v v v v v v v v v v



ation system; can be caused by human errors, natural disaster, or malicious activity.
v v v v v v v v v v v v



12. Parkerian hexad model: A model that adds three more principle triad: s to the CIA
v v v v v v v v v v
v v v




Possession/Control U v



tility
Authenticity
13. Possession/ control: Refers to the physical disposition of the media on which the data i
v v v v v v v v v v v v v v



s stored; This allows you to discuss loss of data via its physical medium.
v v v v v v v v v v v v v




2v/v37

,14. Principle of Possession example: Lost package (encrypted USB's and unen-
v v v v v v v v v



v crypted USB's) v




possession is an issue because the tapes are physically lost.
v v v v v v v v v




(Unencrypted is compromised via confidentiality and possession; encrypted is com-
v v v v v v v v v



v promised only via possession). v v v



15. Principle of Authenticity: Allows you to say whether you've attributed the data in questi
v v v v v v v v v v v v v



on to the proper owner/creator.
v v v v



16. Ways authenticity can be compromised: Sending an email but altering the message
v v v v v v v v v v v v



to look like it came from someone else, than the original one that was sent.
v v v v v v v v v v v v v v



17. Utility: How useful the data is to you. v v v v v v v




Ex. Unencrypted (a lot of utility) Encrypted (little utility).
v v v v v v v v



18. Security Attacks: Broken down from the type of attack, risk the attack repre-
v v v v v v v v v v v v



v sents, and controls you might use to mitigate it.
v v v v v v v v



19. Types of attacks: 1- interceptionv v v v



2- interruption
3- modification
4- fabrication
20. Interception: Attacks allows unauthorized users to access our data, applica- v v v v v v v v v



v tions, or environments.
v v




Primarily an attack against confidentiality
v v v v



21. Interception Attack Examples: Unauthorized file viewing, copying, eavesdrop-
v v v v v v v




3v/v37

, v ping on phone conversations, reading someone's emails.
v v v v v v



22. Interruption: Attacks cause our assets to become unstable or unavailable for our use,
v v v v v v v v v v v v v



on a temporary or permanent basis.
v v v v v




This attack affects availability but can also attack integrity
v v v v v v v v



23. Interruption Attack Examples: DoS attack on a mail server; availability attack
v v v v v v v v v v




Attacker manipulates the processes on which a database runs to prevent access; integrity at
v v v v v v v v v v v v v



ack.

Could also be a combo of both.
v v v v v v



24. Modification: Attacks involve tampering with our asset.v v v v v v




4v/v37

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Excelsolutions Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
557
Member since
1 year
Number of followers
12
Documents
4591
Last sold
19 hours ago
EXCELSOLUTIONS

On this page you will find all documents, Package deals, Test Banks, Solution manuals, WGU, ATI, HESI, ETC........ Always leave a review after purchasing any document so as to make sure our Customers are 100% Satisfied. ALL THE BEST!!!!!!!!!!!!!!!!!!!

3.7

109 reviews

5
46
4
18
3
25
2
6
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions