, WGU D430 FUNDAMENTALS OF INFORMATION
sw sw sw sw
SECURITY FINAL EXAM AND PRACTICE EXAM
sw sw sw sw sw sw s
2024/ACTUAL EXAMS WITH 500 QUESTIONS A
w sw sw sw sw sw
ND
CORRECT DETAILED ANSWERS/A+ GRADEW
sw sw sw w
s
GU D430 FINAL EXAM
sw sw sw
Accesssw Controlsw Listsw –
CORRECTswANSWER:s w infos w abouts w whats w kinds w ofs w accesss w certainpartiess
w areswallowedswtoswhaveswtoswaswgivenswsystem
Readsw,swwritesw,swexecute
Accesssw Controls w Modelss w –
CORRECTswANSWER:s w Discretionarys w (s w DACsw )Mandatorys w (s w M
ACsw )swRulesw-swbased
Roles w -swbasedsw(sw RBACsw)
Attributesw-s w basedsw(swABACsw)
Accountabilitys w –
CORRECTswANSWER:
Referssw tosw makingsw suresw thatswasw personsw isresponsibles w forsw theirsw actionssw .
-
Itsw providessw usswwithswthesw meanssw tosw tracesw activitiessw insw oursw environmentsw backsw tos w their
source
-
Dependssw onswidentifications w ,sw authentications w ,sw andsw accesss w controls w beingsw p
resents w soswthatswwecanswknowswwhoswaswgivenswtransactionswisswassociatedswwithsw
,swandswwhat
permissionssw weresw useds w tosw allowsw themsw tosw carrysw itsw outsw.
2/85
,Acesssw Controlsw –
CORRECTswANSWER:s w Allowings w -
sw letss w ussw gives w as w particularsw partys w accesstoswasw givenswsource
Denyingsw -sw oppositesw ofs w gainingsw access
Limitingsw -swallowingsw someswaccesssw toswoursw resourcesw ,s w onlyswupswtosw asw certainsw point
Revokingsw -sw takess w accesssw awaysw fromsw formersw user
AESsw–
CORRECTswANSWER:swusesswthreeswdifferentswcipherssw:swoneswwithswasw128sw-
sw bitswkeysw,swoneswwithswasw192sw-swbitswkeysw,swandswoneswwithswasw256sw-
sw bitswkeysw,swallswhavingswaswblockswlengthswofsw128swbits
Asymmetrics w cryptographys w –
CORRECTswANSWER:s w asw publics w keysw andsw asw privatesw keys w .swThepublicsw ke
yswissw usedsw toswencryptsw datasw sentsw fromsw thesw sendersw tosw thesw receiversw andsw i
ssw shareds w withsw everyonesw .swPrivatesw keyssw areswusedsw tos w decryptsw datasw thats
w arrivessw atsw theswreceivingsw ends w andsw areswveryswcarefullyswguardedswbyswtheswr
eceives w (swakaswtheswpublicswkeyswcryptographysw)
Asymmetricsw KeyswAlgorithmss w –
CORRECTswANSWER:
Securesw Socketss w Layersw (sw RSAsw)Ellipticsw Curvesw Cryptographys
w sw( ECCsw )swPrettyswGoodswPrivacysw(swPGPsw)
TransportswLayerswSecurit
ysw(swTLSsw)
AttackswTypessw–
3/85
, CORRECTswANSWER:s w InterceptionInterruptionswModificat
ion
Fabrication
Attacksw typessw andsw theirsw effectsw –
CORRECTswANSWER:swInterceptionswisswtheswONLYswattacks w thatsw affectsswon
sw confidentiality.s w Interruption,s w modification,s w andswfabrications w affectss w integr
ityandswavailabilityswbecauseswmostswofswtheswtimeswthey'reswimpactingswdata.
Attributesw -sw basedsw (swABACsw )
-
sw CORRECTswANSWER:s w basedsw onsw attributessw ,sw suchsw assw ofs w apersonsw ,s w r
esourcesw ,sw orswanswenvironment
Auditingsw –
CORRECTswANSWER:s w thes w examinations w ands w reviews w ofs w ans w organization
'sswrecordsswtosw ensureswaccountabilityswthroughswtechnicalswmeanssw.
Authentications w –
CORRECTswANSWER:s w verifyingsw thats w asw personsw issw whosw theysw claimsw tos w be
Authorizations w –
CORRECTswANSWER:s w whatsw thesw usersw canswaccesss w ,swmodifysw,sw andsw delete
Availabilitys w –
CORRECTswANSWER:s w Fors w one'sswAUTHORIZEDs w toswACCESSs w datas w whenneeded
4/85