100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM |325 QUESTIONS AND ANSWERS ||LATEST UPDATED

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
12-04-2025
Written in
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM |325 QUESTIONS AND ANSWERS ||LATEST UPDATED











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 12, 2025
Number of pages
30
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d430
  • wgu

Content preview

WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM |325 QUESTIONS AND
ANSWERS ||LATEST UPDATED 2025\2026

, lOMoARcPSD| 54339004




WGU D430 fundamentals of information security
Exam Latest Update 2025/2026 325 Questions
and Verified Correct Answers Guaranteed A+
3DES - CORRECT ANSWER: DES used to encrypt each block three times , each with a
different key

Access Control List - CORRECT ANSWER: info about what kind of access certain
parties are allowed to have to a given system
Read , write , execute

Access Control Models - CORRECT ANSWER: Discretionary ( DAC )
Mandatory ( MAC )
Rule - based
Role - based ( RBAC )
Attribute - based ( ABAC )

Accountability - CORRECT ANSWER: Refers to making sure that a person is
responsible for their actions .
-It provides us with the means to trace activities in our environment back to their source
.
-Depends on identification , authentication , and access control being present so that we
can know who a given transaction is associated with , and what permissions were used
to allow them to carry it out .

Acess Control - CORRECT ANSWER: Allowing - lets us give a particular party access
to a given source
Denying - opposite of gaining access
Limiting - allowing some access to our resource , only up to a certain point
Revoking - takes access away from former user

AES - CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128 bits

Asymmetric cryptography - CORRECT ANSWER: a public key and a private key . The
public key is used to encrypt data sent from the sender to the receiver and is shared
with everyone . Private keys are used to decrypt data that arrives at the receiving end
and are very carefully guarded by the receive ( aka the public key cryptography )

Asymmetric Key Algorithms - CORRECT ANSWER: Secure Sockets Layer ( RSA )
Elliptic Curve Cryptography ( ECC )

, lOMoARcPSD| 54339004




Pretty Good Privacy ( PGP )
Transport Layer Security ( TLS )
Attack Types - CORRECT ANSWER: Interception
Interruption
Modification
Fabrication

Attack types and their effect - CORRECT ANSWER: Interception is the ONLY attack
that affects on confidentiality. Interruption, modification, and fabrication affects integrity
and availability because most of the time they're impacting data.

Attribute - based ( ABAC ) - CORRECT ANSWER: based on attributes , such as of a
person , resource , or an environment

Auditing - CORRECT ANSWER: the examination and review of an organization's
records to ensure accountability through technical means .

Authentication - CORRECT ANSWER: verifying that a person is who they claim to be

Authorization - CORRECT ANSWER: what the user can access , modify , and delete

Availability - CORRECT ANSWER: For one's AUTHORIZED to ACCESS data when
needed

BinScope Binary Analyzer - CORRECT ANSWER: a tool developed by Microsoft to
examine source code for general good practices

Block Cipher - CORRECT ANSWER: takes a predetermined number of bits , known as
a block , in the plaintext message and encrypts that block

Brute Force - CORRECT ANSWER: an attack by submitting password attempts until
eventually guessed correctly

Buffer overflows - CORRECT ANSWER: a vulnerability that occurs when we do not
properly store the size of the data input into our applications , causing the program to
crash and an attacker to take advantage

Certificates - CORRECT ANSWER: link a public key to a particular individual and are
often used as a form of electronic identification for that particular person

Childrens ' Online Privacy Protection Act (COPPA) - CORRECT ANSWER: sets rules

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TESTSMASTER Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
70
Member since
11 months
Number of followers
2
Documents
8760
Last sold
2 days ago

4.3

16 reviews

5
11
4
2
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions