100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM STUDY GUIDE OBJECTIVE ASSESSMENT NEWEST 2025 TEST BANK ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

Rating
-
Sold
-
Pages
29
Grade
A+
Uploaded on
20-03-2025
Written in
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM STUDY GUIDE OBJECTIVE ASSESSMENT NEWEST 2025 TEST BANK ACTUAL EXAM QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Document information

Uploaded on
March 20, 2025
Number of pages
29
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d430

Content preview

WGU D430 fundamentals of information security

1. Information se- protecting data, software, and hardware secure against unauthorized access, use,
curity disclosure, disruption, modification, or destruction.

2. Compliance The requirements that are set forth by laws and industry regulations.

IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal
government agencies

3. DAD Triad Disclosure, alteration, and denial

4. CIA Triad The core model of all information security concepts. Confidential, integrity and
availability

5. Confidential Ability to protect our data from those who are not authorized to view it.

6. What ways can - lose a personal laptop with data
confidentiality be - Person can view your password you are entering in
compromised? - Send an email attachment to the wrong person.
- Attacker can penetrate your systems....etc.

7. integrity Keeping data unaltered by accidental or malicious intent

8. How to maintain Prevent unauthorized changes to the data and the ability to reverse unwanted
integrity? authorized changes.

Via system/file permissions or Undo/Roll back undesirable changes.

9. Availability The ability to access data when needed

10. Ways Availability - Power loss
can be compro- - Application issues
mised - Network attacks
- System compromised (DoS)




, WGU D430 fundamentals of information security

11. Denial of Service Security problem in which users are not able to access an information system; can
(DoS) be caused by human errors, natural disaster, or malicious activity.

12. Parkerian hexad A model that adds three more principles to the CIA triad:
model
Possession/Control
Utility
Authenticity




13. Possession/ con- Refers to the physical disposition of the media on which the data is stored; This
trol allows you to discuss loss of data via its physical medium.

14. Principle of Pos- Lost package (encrypted USB's and unencrypted USB's)
session example
possession is an issue because the tapes are physically lost.

(Unencrypted is compromised via confidentiality and possession; encrypted is
compromised only via possession).

15. Principle of Au- Allows you to say whether you've attributed the data in question to the proper
thenticity owner/creator.

16. Ways authentici- Sending an email but altering the message to look like it came from someone
ty can be com- else, than the original one that was sent.
promised

17. Utility




, WGU D430 fundamentals of information security

How useful the data is to you.

Ex. Unencrypted (a lot of utility) Encrypted (little utility).

18. Security Attacks Broken down from the type of attack, risk the attack represents, and controls you
might use to mitigate it.

19. Types of attacks 1- interception
2- interruption
3- modification
4- fabrication

20. Interception Attacks allows unauthorized users to access our data, applications, or environ-
ments.

Primarily an attack against confidentiality

21. Interception At- Unauthorized file viewing, copying, eavesdropping on phone conversations, read-
tack Examples ing someone's emails.

22. Interruption Attacks cause our assets to become unstable or unavailable for our use, on a
temporary or permanent basis.

This attack affects availability but can also attack integrity

23. Interruption At- DoS attack on a mail server; availability attack
tack Examples
Attacker manipulates the processes on which a database runs to prevent access;
integrity attack.

Could also be a combo of both.

24. Modification Attacks involve tampering with our asset.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DICKENS maryland university
View profile
Follow You need to be logged in order to follow users or courses
Sold
2265
Member since
10 months
Number of followers
4
Documents
2040
Last sold
9 hours ago
PROSTUDYHUB

4.9

984 reviews

5
867
4
100
3
12
2
4
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions