100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

2025/2026 Study Guide Assessment for WGU D430 fundamentals of information security Exam with Questions and Verified Rationalized Answers Graded A+

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
20-12-2024
Written in
2024/2025

WGU D430 exam study guide fundamentals of information security WGU WGU D430 assessment questions rationalized answers for WGU D430 D430 exam preparation tips information security fundamentals exam help WGU information security exam support study resources for WGU D430 verified answers for D430 exam WGU D430 test guide D430 exam guide WGU WGU D430 review questions information security exam strategy D430 test preparation WGU study material for WGU D430 questions for WGU fundamentals of info security WGU D430 rationalized answer guide prepare for WGU D430 exam fundamentals of information security study plan WGU security fundamentals exam review D430 practice questions WGU WGU information security exam notes effective study guide for WGU D430 WGU D430 test guides best resources for WGU D430 prep fundamentals of info security exam questions

Show more Read less
Institution
WGU D430
Course
WGU D430









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430
Course
WGU D430

Document information

Uploaded on
December 20, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Study Guide Assessment for WGU D430
fundamentals of information security Exam
with Questions and Verified Rationalized Answers Graded A+



1. Confidentiality: Allows only authorized access to requested datar r r r r r r




2. Integrity: Ensures data remains unaltered and reliable
r r r r r r




3. Availability: Enables authorized data access when needed
r r r r r r




4. Possession: Physical Deposition of the media where data is stored
r r r r r r r r r




5. Authenticity: Proper attribution to the owner or creator of the data
r r r r r r r r r r




6. Utility: Measures the usefulness of the data
r r r r r r




7. What are the 3 components of the CIATriad?: Confidentiality, Integrity, Avail- ability
r r r r r r r r r r r r




8. What are the 6 components of the Parkerian Hexad?: Confidentiality, Integrity, Availability
r r r r r r r r r r r




, Possession, Authenticity, Utility
r r r




9. What are the 4 AttackTypes?: Interception, Interruption, Modification, Fabrica- tion
r r r r r r r r r r




10. Interception: Attacker has access to data, applications, or environment
r r r r r r r r




11. Interruption: Attacks cause assets to become unusable or unavailable
r r r r r r r r




12. Modification: Attacks involve tampering with assets r r r r r




13. Fabrication: Attacks that create false information
r r r r r




14. Threat: Potential to cause harm
r r r r




15. Vulnerability: Weaknesses that can be used to harm us r r r r r r r r




16. Authentication: Verifies a person's identity through various factors r r r r r r r




17. Mutual Authentication: both parties authenticate each other using digital cer-
r r r r r r r r r




tificates to prevent man-in-the-middle attacks
r r r r r



1r/r9

, 18. What are the 5 steps in the Risk Management Process?: Identify Asset, Identify Thr
r r r r r r r r r r r r r




eats, Assess Vulnerabilities, Assess Risk, Mitigate Risk
r r r r r r




19. Identify Asset: Categorize Assets being protected
r r r r r




20. IdentifyThreats: recognize potential threats
r r r r




21. AssessVulnerabilities: evaluate impacts
r r r




22. Assess Risk: overall risk assessment
r r r r




23. Mitigate Risk: ensure threats are accounted for
r r r r r r




24. What are the 6 steps in the Incident Response Process?: Preparation, Detection & A
r r r r r r r r r r r r r




nalysis, Containment, Eradication, Recovery, Post-incident activity
r r r r r




25. Preparation: Activities performed in advance to better handle incidents
r r r r r r r r




26. Detection & Analysis: Identify and analyze incidents
r r r r r r




27. Containment: Steps to prevent further damage r r r r r




28. Eradication: Remove effects of the issue r r r r r




29. Recovery: Restore devices or data to pre-incident state
r r r r r r r




30. Post-incident activity: determine what happened and prevent recurrence
r r r r r r r




31. Authorization: determines user access, modification, and deletion
r r r r r r




32. Least Privilege: Provides minimum access necessary for functionality
r r r r r r r




33. Access Control: Allows, denies, limits, and revokes access
r r r r r r r




2r/r9

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Excelsolutions Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
557
Member since
1 year
Number of followers
12
Documents
4591
Last sold
19 hours ago
EXCELSOLUTIONS

On this page you will find all documents, Package deals, Test Banks, Solution manuals, WGU, ATI, HESI, ETC........ Always leave a review after purchasing any document so as to make sure our Customers are 100% Satisfied. ALL THE BEST!!!!!!!!!!!!!!!!!!!

3.7

109 reviews

5
46
4
18
3
25
2
6
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions