WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM
OBJECTIVE ASSESSMENT NEWEST 2024
TEST BANK ACTUAL EXAM 300
QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+ Questions and
Correct Answers/ Latest Update /
Already Graded
Information security
Ans: Keeping data, software, and hardware secure against unauthorized
access, use, disclosure, disruption, modification, or destruction.
Compliance
Ans: The requirements that are set forth by laws and industry regulations.
Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry,
FISMA- federal government agencies
CIA
,2 | Page
Ans: The core model of all information security. Confidential, integrity and
availability
Confidential
Ans: Allowing only those authorized to access the data requested
integrity
Ans: Keeping data unaltered by accidental or malicious intent
Availability
Ans: The ability to access data when needed
Parkerian hexad model
Ans: Confidentiality , integrity, availability, possession/control, authenticity,
utility
Possession/ control
,3 | Page
Ans: Refers to the physical disposition of the media on which the data is
stored
authenticity
Ans: Allows us to talk about the proper attribution as to the owner or
creator of the data in question
Utility
Ans: How useful the data is to us
Types of attacks
Ans: 1- interception
2- interruption
3- modification
4- fabrication
Interception
, 4 | Page
Ans: Attacks allows unauthorized users to access our data, applications, or
environments. Are primarily an attack against confidentiality
Interruption
Ans: Attacks cause our assets to become unstable or unavailable for our
use, on a temporary or permanent basis. This attack affects availability but
can also attack integrity
Modification
Ans: Attacks involve tampering with our asset. Such attacks might primarily
be considered an integrity attack, but could also be an availability
attack.
Fabrication
Ans: Attacks involve generating data, processes, communications, or
other similar activities with a system. Attacks primarily affect integrity but
can be considered an availability attack.