OF INFORMATION SECURITY
EXAM 2025 OBJECTIVE
ASSESSMENT
about:blank 1/86
, WGU D430 FUNDAMENTALS
OF INFORMATION SECURITY
EXAM 2025 OBJECTIVE
ASSESSMENT
Acess Control –
CORRECT ANSWER : Allowing - let s us give a particular party access to a given
source
Denyi ng - opposite of gainin g access
Limiting - allowin g so me access to our resour ce , only up to a cert ain point
Revoking - ta kes access away from former user
AES –
CORRECT ANSWE R: uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 25 6 - bit key , all hav ing a block length of 128
bits
Asymmetri c cryptography –
CORRECT ANSWE R: a public key and a pr ivate key . The public key is used to
encrypt d ata sent from the sender to the r eceiver and is shared with every one .
Private keys are used to decrypt d ata that arrives at t he receivin g end and are
very carefully guarded by the receive ( aka the public key cryptography )
Asymmetri c Key Algorithm s –
CORR ECT ANSWER:
Secure Sockets Layer ( RSA ) Elliptic Cu rve Cryptography ( E CC )
Pretty Good Privacy ( PGP )
T ransp ort Layer Security (
TLS )
about:blank Attack Types – 2/86
, WGU D430 FUNDAMENTALS
OF INFORMATION SECURITY
EXAM 2025 OBJECTIVE
ASSESSMENT
CORRECT ANSWER : Interception Interruption
Modification
Fabrica tion
Attack types and their effect –
CORRECT ANS W ER: Interception is the ONLY attack that a ffects on
confidentiality. Interruption, modification, and fabrication affects inte grity a nd
availability because most of the time they 're impacting data.
Attribute - based ( AB AC )
- CORRECT ANSWER : based on attributes , such as of a p erson , resource , or
an env ironment
Auditing –
CORRECT ANSWE R: the examination and review of an organization's
records to ensure accountability thr ough technical means .
Authentication –
CORRECT ANSWER : verifying that a perso n is who th ey claim to be
Authorization –
CORRECT ANS WER : what the user can access , modify , and delete
Availability –
CORRECT ANSWE R: For o ne's AUT HORIZED to A CCESS data w hen needed
about:blank 3/86
, WGU D430 FUNDAMENTALS
OF INFORMATION SECURITY
EXAM 2025 OBJECTIVE
ASSESSMENT
BinScope Binary Analyzer –
CORRECT ANSWE R: a to ol developed by Microsoft to ex amine source code
for general good practices
Block Cipher –
CORRECT ANSWE R: takes a predetermined num ber of bits , kn own as a block , in th e
plai ntext message and encrypts that block
Brute Force –
CORRECT ANSWER : an attack by submitti ng password attempts until eventually
guessed correctly
Buffer overflows –
CORRECT ANSWE R:
a vulnerab ility that occurs when we do not properly store the size of the data in put
into our applications , causing the program to crash and an attacker to take
advantage
Certificates –
CORRECT ANSWE R: link a public key to a particular in dividual and are often used
as a form of electronic i dentification for t hat particular person
Childrens ' Online Privacy Protection Act (CO PPA) –
CORRECT ANSWE R: sets rules on data coll ectio n for ch ildren un der 13 to
about:blank protect t heir online priv acy 4/86