5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
WGUrD430r FUNDAMENTALSr OFrINFORMATIONrS
ECURITYrFINALrEXAMrANDr PRACTICEr EXAMr2024/
ACTUALrEXAMSr WITHr 500r QUESTIONSrAND
CORRECTr DETAILEDrANSWERS/A+r GRADErWG
UrD430rFINALrEXAM
Accessr Controlr Listr –
CORRECTrANSWER:r infor aboutr whatr kindr ofr accessr certainpartiesr arerallow
edrtorhavertorargivenrsystem
Readr,r writer,rexecute
Accessr Controlr Modelsr –
CORRECTrANSWER:r Discretionaryr (r DACr )Mandatoryr (r MACr )rRul
er-rbased
Roler -rbasedr(rRBACr )
Attributer-r basedr (rABACr)
Accountabilityr –
CORRECTrANSWER:
Refersr tor makingr surer thatrar personr isresponsibler forr theirr actionsr .
-Itr providesr usr withrther meansr tor tracer activitiesr inr ourr environmentr backr tor their
source
-
Dependsr onridentificationr ,r authenticationr ,r andr accessr controlr beingr presentr sorth
atrwecanrknowr whor argivenrtransactionr israssociatedr withr,randr what
permissionsr werer usedr tor allowr themr tor carryr itr outr.
about:blank 1/85
,5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
Acessr Controlr –
CORRECTrANSWER:r Allowingr -
r letsr usr giver ar particularr partyr accesstor ar givenrsource
Denyingr -r oppositer ofr gainingr access
Limitingr -rallowingr someraccessr torourrresourcer ,r onlyruprtor ar certainr point
Revokingr -r takesr accessr awayr fromr formerr user
AESr–
CORRECTrANSWER:rusesrthreerdifferentrciphersr:ronerwithrar128r-
rbitrkeyr,ronerwithrar192r-rbitrkeyr,randronerwithrar256r-
rbitrkeyr,rallrhavingrarblockrlengthrofr128rbits
Asymmetricr cryptographyr –
CORRECTrANSWER:r ar publicr keyr andr ar privater keyr .rThepublicr keyrisr usedr tore
ncryptr datar sentr fromr ther senderr tor ther receiverr andr isr sharedr withr everyoner .rPri
vaterkeysr arer usedr tor decryptr datarthatrarrivesr atr therreceivingr endr andr arerveryr
carefullyrguardedrbyrtherreceiver (rakartherpublicrkeyr cryptographyr)
Asymmetricr KeyrAlgorithmsr –
CORRECTrANSWER:
Securer Socketsr Layerr (r RSAr)Ellipticr Curver Cryptographyr (r ECCr )r
PrettyrGoodrPrivacyr(rPGPr)
TransportrLayerrSecurityr(r
TLSr)
AttackrTypesr –
about:blank 2/85
,5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
CORRECTrANSWER:r InterceptionInterruptionrModificatio
n
Fabrication
Attackrtypesr andr theirr effectr –
CORRECTrANSWER:rInterceptionrisrtherONLYrattackr thatraffectsronrconfident
iality.r Interruption,r modification,r andrfabricationr affectsr integrityandravailabilityr
becausermostrofrthertimerthey'rerimpactingrdata.
Attributer -r basedr (rABACr )
-
r CORRECTrANSWER:r basedr onr attributesr ,r suchr asr ofr apersonr ,r resourcer ,r orra
nrenvironment
Auditingr –
CORRECTrANSWER:r ther examinationr andr reviewr ofr anr organization'srrecords
rtor ensureraccountabilityrthroughrtechnicalrmeansr.
Authenticationr –
CORRECTrANSWER:r verifyingr thatr ar personr isr whor theyr claimr tor be
Authorizationr –
CORRECTrANSWER:r whatr ther userr canraccessr ,rmodifyr,r andr delete
Availabilityr –
CORRECTrANSWER:r Forr one'srAUTHORIZEDr torACCESSr datar whenneeded
about:blank 3/85
, 5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
BinScoper BinaryrAnalyzerr –
CORRECTrANSWER:r ar toolr developedr byr Microsoftr toexaminer sourcer coderf
orrgeneralrgoodrpractices
Blockr Cipherr –
CORRECTrANSWER:r takesr ar predeterminedr numberr ofr bitsr ,r knownrasar blockr ,rinr therp
laintextr messagerandrencryptsrthatr block
Bruter Forcer –
CORRECTrANSWER:r anr attackr byr submittingr passwordr attemptsr untileventuallyrgue
ssedrcorrectly
Bufferr overflowsr –
CORRECTrANSWER:
ar vulnerabilityr thatr occursr whenr wer dor notr properlyr storer ther sizerofr ther datar inputri
ntorourr applicationsr ,rcausingr ther programrtocrashrandr anrattackerrtor take
advantage
Certificatesr –
CORRECTrANSWER:r linkr ar publicr keyr torar particularr individualr andr areoftenr used
asr ar formrofr electronicr identificationr forr thatr particularrperson
Childrensr 'r Onliner Privacyr ProtectionrActr (COPPA)r –
CORRECTrANSWER:r setsr rulesonr datar collectionr forr childrenr underr 13r tor
protectrtheirronlinerprivacy
about:blank 4/85
WGUrD430r FUNDAMENTALSr OFrINFORMATIONrS
ECURITYrFINALrEXAMrANDr PRACTICEr EXAMr2024/
ACTUALrEXAMSr WITHr 500r QUESTIONSrAND
CORRECTr DETAILEDrANSWERS/A+r GRADErWG
UrD430rFINALrEXAM
Accessr Controlr Listr –
CORRECTrANSWER:r infor aboutr whatr kindr ofr accessr certainpartiesr arerallow
edrtorhavertorargivenrsystem
Readr,r writer,rexecute
Accessr Controlr Modelsr –
CORRECTrANSWER:r Discretionaryr (r DACr )Mandatoryr (r MACr )rRul
er-rbased
Roler -rbasedr(rRBACr )
Attributer-r basedr (rABACr)
Accountabilityr –
CORRECTrANSWER:
Refersr tor makingr surer thatrar personr isresponsibler forr theirr actionsr .
-Itr providesr usr withrther meansr tor tracer activitiesr inr ourr environmentr backr tor their
source
-
Dependsr onridentificationr ,r authenticationr ,r andr accessr controlr beingr presentr sorth
atrwecanrknowr whor argivenrtransactionr israssociatedr withr,randr what
permissionsr werer usedr tor allowr themr tor carryr itr outr.
about:blank 1/85
,5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
Acessr Controlr –
CORRECTrANSWER:r Allowingr -
r letsr usr giver ar particularr partyr accesstor ar givenrsource
Denyingr -r oppositer ofr gainingr access
Limitingr -rallowingr someraccessr torourrresourcer ,r onlyruprtor ar certainr point
Revokingr -r takesr accessr awayr fromr formerr user
AESr–
CORRECTrANSWER:rusesrthreerdifferentrciphersr:ronerwithrar128r-
rbitrkeyr,ronerwithrar192r-rbitrkeyr,randronerwithrar256r-
rbitrkeyr,rallrhavingrarblockrlengthrofr128rbits
Asymmetricr cryptographyr –
CORRECTrANSWER:r ar publicr keyr andr ar privater keyr .rThepublicr keyrisr usedr tore
ncryptr datar sentr fromr ther senderr tor ther receiverr andr isr sharedr withr everyoner .rPri
vaterkeysr arer usedr tor decryptr datarthatrarrivesr atr therreceivingr endr andr arerveryr
carefullyrguardedrbyrtherreceiver (rakartherpublicrkeyr cryptographyr)
Asymmetricr KeyrAlgorithmsr –
CORRECTrANSWER:
Securer Socketsr Layerr (r RSAr)Ellipticr Curver Cryptographyr (r ECCr )r
PrettyrGoodrPrivacyr(rPGPr)
TransportrLayerrSecurityr(r
TLSr)
AttackrTypesr –
about:blank 2/85
,5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
CORRECTrANSWER:r InterceptionInterruptionrModificatio
n
Fabrication
Attackrtypesr andr theirr effectr –
CORRECTrANSWER:rInterceptionrisrtherONLYrattackr thatraffectsronrconfident
iality.r Interruption,r modification,r andrfabricationr affectsr integrityandravailabilityr
becausermostrofrthertimerthey'rerimpactingrdata.
Attributer -r basedr (rABACr )
-
r CORRECTrANSWER:r basedr onr attributesr ,r suchr asr ofr apersonr ,r resourcer ,r orra
nrenvironment
Auditingr –
CORRECTrANSWER:r ther examinationr andr reviewr ofr anr organization'srrecords
rtor ensureraccountabilityrthroughrtechnicalrmeansr.
Authenticationr –
CORRECTrANSWER:r verifyingr thatr ar personr isr whor theyr claimr tor be
Authorizationr –
CORRECTrANSWER:r whatr ther userr canraccessr ,rmodifyr,r andr delete
Availabilityr –
CORRECTrANSWER:r Forr one'srAUTHORIZEDr torACCESSr datar whenneeded
about:blank 3/85
, 5/7/24,r3:16rPM WGUrD430rfundamentalsrofrinformationrsecurityrExamrLatestrUpdater2024r2…
BinScoper BinaryrAnalyzerr –
CORRECTrANSWER:r ar toolr developedr byr Microsoftr toexaminer sourcer coderf
orrgeneralrgoodrpractices
Blockr Cipherr –
CORRECTrANSWER:r takesr ar predeterminedr numberr ofr bitsr ,r knownrasar blockr ,rinr therp
laintextr messagerandrencryptsrthatr block
Bruter Forcer –
CORRECTrANSWER:r anr attackr byr submittingr passwordr attemptsr untileventuallyrgue
ssedrcorrectly
Bufferr overflowsr –
CORRECTrANSWER:
ar vulnerabilityr thatr occursr whenr wer dor notr properlyr storer ther sizerofr ther datar inputri
ntorourr applicationsr ,rcausingr ther programrtocrashrandr anrattackerrtor take
advantage
Certificatesr –
CORRECTrANSWER:r linkr ar publicr keyr torar particularr individualr andr areoftenr used
asr ar formrofr electronicr identificationr forr thatr particularrperson
Childrensr 'r Onliner Privacyr ProtectionrActr (COPPA)r –
CORRECTrANSWER:r setsr rulesonr datar collectionr forr childrenr underr 13r tor
protectrtheirronlinerprivacy
about:blank 4/85