100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST TEST BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ | LATEST UPDATE

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
08-04-2025
Written in
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST TEST BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ | LATEST UPDATE / Information security - Answer-Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction. /.Compliance - Answer-The requirements that are set forth by laws and industry regulations. Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government agencies /.CIA - Answer-The core model of all information security. Confidential, integrity and availability /.Confidential - Answer-Allowing only those authorized to access the data requested /.integrity - Answer-Keeping data unaltered by accidental or malicious intent /.Availability - Answer-The ability to access data when needed /.Parkerian hexad model - Answer-Confidentiality , integrity, availability, possession/control, authenticity, utility /.Possession/ control - Answer-Refers to the physical disposition of the media on which the data is stored /.authenticity - Answer-Allows us to talk about the proper attribution as to the owner or creator of the data in question /.Utility - Answer-How useful the data is to us /.Types of attacks - Answer-1- interception 2- interruption 3- modification 4- fabrication /.Interception - Answer-Attacks allows unauthorized users to access our data, applications, or environments. Are primarily an attack against confidentiality /.Interruption - Answer-Attacks cause our assets to become unstable or unavailable for our use, on a temporary or permanent basis. This attack affects availability but can also attack integrity /.Modification - Answer-Attacks involve tampering with our asset. Such attacks might primarily be considered an integrity attack, but could also be an availability attack. /.Fabrication - Answer-Attacks involve generating data, processes, communications, or other similar activities with a system. Attacks primarily affect integrity but can be considered an availability attack. /.Risk - Answer-The likelihood that a threat will occur. There must be a threat and vulnerability /.Threat - Answer-Any event being man-made, natural or environmental that could damage the assets /.Vulnerabilities - Answer-Weakness that a threat event or the threat can take advantage of /.Impact - Answer-taking into account the assets cost /.Controls - Answer-The ways we protect assets. Physical, technical/ logical, and administrative /.Physical controls - Answer-Controls are physical items that protect assets. Think of locks, doors, guards and fences /.Technical/ logical controls - Answer-Controls are devices and software that protect assets. Think of firewalls, av, ids, and ips /.Administrative controls - Answer-Controls are the policies that organizations create for governance. Ex: email policies /.risk mamagement - Answer-A constant process as assets are purchased, used and retired. The general steps are 1- identify assets 2- identify threats 3- assess vulnerabilities 4- assess risk 5- mitigating risks /.Identify assets - Answer-First and most important part or risk management. Identifying and categorizing the assets we are protecting /.Identify threats - Answer-Once we have our critical assets we can identify the threats that might effect them /.Assess Vulnerabilities - Answer-Look at potential threats. any given asset may have thousand or millions of threats that could impact it, but only a small fraction of the threats will be relevant /.Assess risks - Answer-Once we have identified the threats and vulnerabilities for a given asset we can access the overall risk /.Mitigating risks - Answer-Putting measures in place to help ensure that a given type of threat is accounted for /.Incident response - Answer-Response to when risk management practices have failed and have cause an inconvenience to a disastrous event /.Incident response cycle - Answer-1 preparation 2- detection and analysis 3- containment 4- eradication 5- recovery 6- post incident activity /.Preparation phase - Answer-The preparation phase consists of all of the activities that we can preform in advance of the incident itself in order to better enable us to handle it /.Detection and analysis phase - Answer-Where the action begins to happen. We will detect the occurrence of an issue and decide whether or not it is actually an incident so that we can respond /.Containment phase - Answer-Taking steps to ensure that the situation does not cause any more damage than it already has, or to at least lessen any ongoing harm. /.Eradication phase - Answer-We will attempt to remove the effects of the issue from our environment /.Recovery phase - Answer-Recover to a better state that we were prior to the incident or perhaps prior to when the issue started if we did not detect it immediately

Show more Read less
Institution
WGU D430 FUNDAMENTALS
Course
WGU D430 FUNDAMENTALS










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430 FUNDAMENTALS
Course
WGU D430 FUNDAMENTALS

Document information

Uploaded on
April 8, 2025
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • latest update

Content preview

WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM
OBJECTIVE ASSESSMENT NEWEST
2025\2026 TEST BANK ACTUAL EXAM
300 QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED
ANSWERS) |ALREADY GRADED A+ |
LATEST UPDATE
/ Information security - Answer-Keeping data, software, and hardware secure against
unauthorized access, use, disclosure, disruption, modification, or destruction.

/.Compliance - Answer-The requirements that are set forth by laws and industry
regulations. Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry,
FISMA- federal government agencies

/.CIA - Answer-The core model of all information security. Confidential, integrity and
availability

/.Confidential - Answer-Allowing only those authorized to access the data requested

/.integrity - Answer-Keeping data unaltered by accidental or malicious intent

/.Availability - Answer-The ability to access data when needed

/.Parkerian hexad model - Answer-Confidentiality , integrity, availability,
possession/control, authenticity, utility

/.Possession/ control - Answer-Refers to the physical disposition of the media on which
the data is stored

/.authenticity - Answer-Allows us to talk about the proper attribution as to the owner or
creator of the data in question

/.Utility - Answer-How useful the data is to us

/.Types of attacks - Answer-1- interception

,2- interruption
3- modification
4- fabrication

/.Interception - Answer-Attacks allows unauthorized users to access our data,
applications, or environments. Are primarily an attack against confidentiality

/.Interruption - Answer-Attacks cause our assets to become unstable or unavailable for
our use, on a temporary or permanent basis. This attack affects availability but can also
attack integrity

/.Modification - Answer-Attacks involve tampering with our asset. Such attacks might
primarily be considered an integrity attack, but could also be an availability attack.

/.Fabrication - Answer-Attacks involve generating data, processes, communications, or
other similar activities with a system. Attacks primarily affect integrity but can be
considered an availability attack.

/.Risk - Answer-The likelihood that a threat will occur. There must be a threat and
vulnerability

/.Threat - Answer-Any event being man-made, natural or environmental that could
damage the assets

/.Vulnerabilities - Answer-Weakness that a threat event or the threat can take
advantage of

/.Impact - Answer-taking into account the assets cost

/.Controls - Answer-The ways we protect assets. Physical, technical/ logical, and
administrative

/.Physical controls - Answer-Controls are physical items that protect assets. Think of
locks, doors, guards and fences

/.Technical/ logical controls - Answer-Controls are devices and software that protect
assets. Think of firewalls, av, ids, and ips

/.Administrative controls - Answer-Controls are the policies that organizations create for
governance. Ex: email policies

/.risk mamagement - Answer-A constant process as assets are purchased, used and
retired. The general steps are 1- identify assets
2- identify threats
3- assess vulnerabilities
4- assess risk

, 5- mitigating risks

/.Identify assets - Answer-First and most important part or risk management. Identifying
and categorizing the assets we are protecting

/.Identify threats - Answer-Once we have our critical assets we can identify the threats
that might effect them

/.Assess Vulnerabilities - Answer-Look at potential threats. any given asset may have
thousand or millions of threats that could impact it, but only a small fraction of the
threats will be relevant

/.Assess risks - Answer-Once we have identified the threats and vulnerabilities for a
given asset we can access the overall risk

/.Mitigating risks - Answer-Putting measures in place to help ensure that a given type of
threat is accounted for

/.Incident response - Answer-Response to when risk management practices have failed
and have cause an inconvenience to a disastrous event

/.Incident response cycle - Answer-1 preparation
2- detection and analysis
3- containment
4- eradication
5- recovery
6- post incident activity

/.Preparation phase - Answer-The preparation phase consists of all of the activities that
we can preform in advance of the incident itself in order to better enable us to handle it

/.Detection and analysis phase - Answer-Where the action begins to happen. We will
detect the occurrence of an issue and decide whether or not it is actually an incident so
that we can respond

/.Containment phase - Answer-Taking steps to ensure that the situation does not cause
any more damage than it already has, or to at least lessen any ongoing harm.

/.Eradication phase - Answer-We will attempt to remove the effects of the issue from our
environment

/.Recovery phase - Answer-Recover to a better state that we were prior to the incident
or perhaps prior to when the issue started if we did not detect it immediately

/.Post incident activity phase - Answer-We attempt to determine specifically what
happened, why it happened, and what we can do to keep it from happening again.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
kartelodoc Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
120
Member since
1 year
Number of followers
4
Documents
8182
Last sold
6 days ago

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Read more Read less
3.2

22 reviews

5
7
4
1
3
7
2
3
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions