WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY ACTUAL
EXAM 100 QUESTIONS AND
CORRECT DETAILED ANSWERS
LATEST VERSION ALREADY A+
GRADED WITH EXPERT
FEEDBACK|BRAND NEW!!{REVISED}
Save
Practice questions for this set
Learn
Studied 7 terms
Nice work, you're crushing it
Continue studying in Learn
,Terms in this set (95)
Define the Our ability to protect data from those
confidentiality in who are not authorized to view it.
the CIA triad.
A patron using an ATM card wants to
Examples of keep their PIN number confidential.
confidentiality An ATM owner wants to keep bank
account numbers confidential.
How can Losing a laptop
confidentiality be An attacker gets access to info
broken? A person can look over your shoulder
The ability to prevent people from
Define integrity in
changing your data and the ability to
the CIA triad.
reverse unwanted changes.
How do you Permissions restrict what users can do
control integrity? (read, write, etc.)
Data used by a doctor to make medical
Examples of
decisions needs to be correct or the
integrity
patient can die.
Define the Our data needs to be accessible when
availability in the we need it.
CIA triad.
, How can Loss of power, application problems. If
availability be caused by an attacker, this is a Denial of
broken? Service attack.
The protection of information and
information systems from unauthorized
Define information access, use, disclosure, disruption,
security. modification, or destruction in order to
provide confidentiality, integrity, and
availability.
The Parkerian Hexad
includes confidentiality,
integrity, and availability
from the CIA triad. It
Define the also includes
Parkerian Hexad possession (or control),
and its principles. authenticity, and utility.
Whether the data in question comes
from who or where it says it comes from
Authenticity
(i.e. did this person actually send this
email?)
INFORMATION SECURITY ACTUAL
EXAM 100 QUESTIONS AND
CORRECT DETAILED ANSWERS
LATEST VERSION ALREADY A+
GRADED WITH EXPERT
FEEDBACK|BRAND NEW!!{REVISED}
Save
Practice questions for this set
Learn
Studied 7 terms
Nice work, you're crushing it
Continue studying in Learn
,Terms in this set (95)
Define the Our ability to protect data from those
confidentiality in who are not authorized to view it.
the CIA triad.
A patron using an ATM card wants to
Examples of keep their PIN number confidential.
confidentiality An ATM owner wants to keep bank
account numbers confidential.
How can Losing a laptop
confidentiality be An attacker gets access to info
broken? A person can look over your shoulder
The ability to prevent people from
Define integrity in
changing your data and the ability to
the CIA triad.
reverse unwanted changes.
How do you Permissions restrict what users can do
control integrity? (read, write, etc.)
Data used by a doctor to make medical
Examples of
decisions needs to be correct or the
integrity
patient can die.
Define the Our data needs to be accessible when
availability in the we need it.
CIA triad.
, How can Loss of power, application problems. If
availability be caused by an attacker, this is a Denial of
broken? Service attack.
The protection of information and
information systems from unauthorized
Define information access, use, disclosure, disruption,
security. modification, or destruction in order to
provide confidentiality, integrity, and
availability.
The Parkerian Hexad
includes confidentiality,
integrity, and availability
from the CIA triad. It
Define the also includes
Parkerian Hexad possession (or control),
and its principles. authenticity, and utility.
Whether the data in question comes
from who or where it says it comes from
Authenticity
(i.e. did this person actually send this
email?)