1/85
, WGUmD430m FUNDAMENTALSmOFmINFORMATIONm
SECURITYmFINALmEXAMmANDmPRACTICEmEXAMm2
024/ACTUALmEXAMSm WITHm 500m QUESTIONSmAND
CORRECTmDETAILEDmANSWERS/A+m GRADEmW
GUmD430mFINALmEXAM
Access mControlmList m–
CORRECTmANSWER: m infomabout mwhat mkindmof maccess mcertainparties mar
emallowedmtomhavemtomamgivenmsystem
Readm, mwritem, mexecute
Access mControlmModels m –
CORRECTmANSWER: mDiscretionary m(mDAC m)Mandatory m(mMA
C m)mRulem-mbased
Rolem-mbasedm(mRBAC m)
Attributem-mbasedm(mABAC m)
Accountability m–
CORRECTmANSWER:
Refers mtommakingmsuremthat mampersonmisresponsiblem formtheirmactions m.
-It mprovides mus mwithmthemmeans mtomtracemactivities minmourmenvironment mback mtomtheir
source
-
Depends monmidentificationm, mauthenticationm, mandmaccess mcontrolmbeingmpres
ent msomthat mwecanmknow mwhomamgivenmtransactionmis massociatedmwithm, mand
mwhat
permissions mweremusedm tomallow mthem mtomcarry mit mout m.
2/85
,Acess mControlm–
CORRECTmANSWER: mAllowingm-
mlets mus mgivemamparticularmparty maccesstomamgivenmsource
Denyingm-moppositemof mgainingmaccess
Limitingm-mallowingmsomemaccess mtomourmresourcem, m only mupmtomamcertainmpoint
Revokingm-mtakes maccess maway mfrom mformermuser
AESm–
CORRECTmANSWER: muses mthreemdifferent mciphers m: monemwithmam128m-
mbit mkey m, monemwithmam192m-mbit mkey m, mandmonemwithmam256m-
mbit mkey m, mallmhavingmamblock mlengthmof m128mbits
Asymmetric mcryptography m –
CORRECTmANSWER: mampublic m key mandmamprivatemkey m. mThepublic mkey mi
s musedmtomencrypt mdatamsent mfrom mthemsendermtomthemreceivermandmis mshar
edm withmeveryonem. mPrivatemkeys maremusedmtom decryptmdatamthat marrivesmat
mthemreceivingmendm andmaremvery mcarefully mguardedmby mthemreceivem(makam
thempublic mkey mcryptography m)
Asymmetric mKey mAlgorithms m–
CORRECTmANSWER:
SecuremSockets m Layerm(mRSAm)Elliptic mCurvemCryptography m(m
ECC m)mPretty mGoodmPrivacy m(mPGPm)
Transport mLayermSecurity
m(mTLSm)
Attack mTypes m–
3/85
, CORRECTmANSWER: m InterceptionInterruptionmModificati
on
Fabrication
Attack mtypes mandmtheirmeffect m–
CORRECTmANSWER: mInterceptionmis mthemONLYmattack mthat maffects monmc
onfidentiality. mInterruption, mmodification, mandmfabricationmaffects mintegrityan
dmavailability mbecausemmost mof mthemtimemthey'remimpactingmdata.
Attributem-mbasedm(mABAC m)
-
mCORRECTmANSWER: mbasedmonmattributes m, msuchmas mof mapersonm, mreso
urcem, mormanmenvironment
Auditingm–
CORRECTmANSWER: m themexaminationmandmreview mof manmorganization's m
records mtomensuremaccountability mthroughmtechnicalmmeans m.
Authenticationm–
CORRECTmANSWER: mverifyingmthat mampersonmis mwhomthey mclaim mtombe
Authorizationm–
CORRECTmANSWER: mwhat mthemusermcanmaccess m, mmodify m, mandmdelete
Availability m –
CORRECTmANSWER: m Form one's mAUTHORIZED m tomACCESSm datam whenneeded
4/85
, WGUmD430m FUNDAMENTALSmOFmINFORMATIONm
SECURITYmFINALmEXAMmANDmPRACTICEmEXAMm2
024/ACTUALmEXAMSm WITHm 500m QUESTIONSmAND
CORRECTmDETAILEDmANSWERS/A+m GRADEmW
GUmD430mFINALmEXAM
Access mControlmList m–
CORRECTmANSWER: m infomabout mwhat mkindmof maccess mcertainparties mar
emallowedmtomhavemtomamgivenmsystem
Readm, mwritem, mexecute
Access mControlmModels m –
CORRECTmANSWER: mDiscretionary m(mDAC m)Mandatory m(mMA
C m)mRulem-mbased
Rolem-mbasedm(mRBAC m)
Attributem-mbasedm(mABAC m)
Accountability m–
CORRECTmANSWER:
Refers mtommakingmsuremthat mampersonmisresponsiblem formtheirmactions m.
-It mprovides mus mwithmthemmeans mtomtracemactivities minmourmenvironment mback mtomtheir
source
-
Depends monmidentificationm, mauthenticationm, mandmaccess mcontrolmbeingmpres
ent msomthat mwecanmknow mwhomamgivenmtransactionmis massociatedmwithm, mand
mwhat
permissions mweremusedm tomallow mthem mtomcarry mit mout m.
2/85
,Acess mControlm–
CORRECTmANSWER: mAllowingm-
mlets mus mgivemamparticularmparty maccesstomamgivenmsource
Denyingm-moppositemof mgainingmaccess
Limitingm-mallowingmsomemaccess mtomourmresourcem, m only mupmtomamcertainmpoint
Revokingm-mtakes maccess maway mfrom mformermuser
AESm–
CORRECTmANSWER: muses mthreemdifferent mciphers m: monemwithmam128m-
mbit mkey m, monemwithmam192m-mbit mkey m, mandmonemwithmam256m-
mbit mkey m, mallmhavingmamblock mlengthmof m128mbits
Asymmetric mcryptography m –
CORRECTmANSWER: mampublic m key mandmamprivatemkey m. mThepublic mkey mi
s musedmtomencrypt mdatamsent mfrom mthemsendermtomthemreceivermandmis mshar
edm withmeveryonem. mPrivatemkeys maremusedmtom decryptmdatamthat marrivesmat
mthemreceivingmendm andmaremvery mcarefully mguardedmby mthemreceivem(makam
thempublic mkey mcryptography m)
Asymmetric mKey mAlgorithms m–
CORRECTmANSWER:
SecuremSockets m Layerm(mRSAm)Elliptic mCurvemCryptography m(m
ECC m)mPretty mGoodmPrivacy m(mPGPm)
Transport mLayermSecurity
m(mTLSm)
Attack mTypes m–
3/85
, CORRECTmANSWER: m InterceptionInterruptionmModificati
on
Fabrication
Attack mtypes mandmtheirmeffect m–
CORRECTmANSWER: mInterceptionmis mthemONLYmattack mthat maffects monmc
onfidentiality. mInterruption, mmodification, mandmfabricationmaffects mintegrityan
dmavailability mbecausemmost mof mthemtimemthey'remimpactingmdata.
Attributem-mbasedm(mABAC m)
-
mCORRECTmANSWER: mbasedmonmattributes m, msuchmas mof mapersonm, mreso
urcem, mormanmenvironment
Auditingm–
CORRECTmANSWER: m themexaminationmandmreview mof manmorganization's m
records mtomensuremaccountability mthroughmtechnicalmmeans m.
Authenticationm–
CORRECTmANSWER: mverifyingmthat mampersonmis mwhomthey mclaim mtombe
Authorizationm–
CORRECTmANSWER: mwhat mthemusermcanmaccess m, mmodify m, mandmdelete
Availability m –
CORRECTmANSWER: m Form one's mAUTHORIZED m tomACCESSm datam whenneeded
4/85