WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024/ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETA ILED ANSWERS/A+ GRADE
WGU D430 FINAL EXA M
Access Control List –
CORRECT ANSWE R: info about what kind of access certain parties are
allowed to have to a given system
Read , write , execu te
Access Control Models –
CORRECT ANSWE R: Discretionary ( DAC ) Mandator y ( MAC )
Rule - based
Role - based ( RBAC )
Attribute - based ( ABAC )
Accountability –
CORRECT ANSWER:
Refers to making sure that a person is responsible for their actions .
-It provides us with the means to trace activities in our environment back to their
source
-Depends on identification , au thentication , and access control being presen t so
that we can know who a given tran saction is associated with , and what
permissions were used to allow them to ca rry it out .
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM
2024 ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS A+ GRADE
1/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
Acess Control –
CORRECT ANSWER: Allowing - let s us give a particular party access to a given
source
Denying - opposite of gaining access
Limiting - allowin g some access to our resource , only up to a certain point
Revoking - ta kes access away from former user
AES –
CORRECT ANSWE R: uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 25 6 - bit key , all having a block length of 128
bits
Asymmetric cryptography –
CORRECT ANSWE R: a public key and a private key . The public key is used to
encrypt data sent from the sender to the r eceiver and is shared with everyone .
Private keys are used to decrypt data that arrives at the receiving end and are
very carefully guarded by the receive ( aka the public key cryptography )
Asymmetric Key Algorithms –
CORRECT ANSWER:
Secure Sockets Layer ( RSA ) Elliptic Curve Cryptography ( E CC )
Pretty Good Privacy ( PGP )
Transport Layer Security (
TLS )
Attack Types –
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM
2024 ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS A+ GRADE
2/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
CORRECT ANSWER: Interception Interruption
Modification
Fabrication
Attack types and their effect –
CORRECT ANSWER: Interception is the ONLY attack that affects on
confidentiality. Interruption, modification, and fabrication affects inte grityand
availability because most of the time they 're impacting data.
Attribute - based ( AB AC )
- CORRECT ANSWER: based on attributes , such as of a person , resource , or
an environment
Auditing –
CORRECT ANSWE R: the examination and review of an organization's
records to ensure accountability thr ough technical means .
Authentication –
CORRECT ANSWER: verifying that a perso n is who they claim to be
Authorization –
CORRECT ANSWER: what the user can access , modify , and delete
Availability –
CORRECT ANSWE R: For one's AUTHORIZED to ACCESS data w hen needed
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM
2024 ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS A+ GRADE
3/85
, 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
BinScope Binary Analyzer –
CORRECT ANSWE R: a tool developed by Microsoft to examine source code
for general good practices
Block Cipher –
CORRECT ANSWE R: takes a predetermined num ber of bits , known asa block , in the
plaintext message and encrypts that block
Brute Force –
CORRECT ANSWER: an attack by submitting password attempts until eventually
guessed correctly
Buffer overflows –
CORRECT ANSWE R:
a vulnerability that occurs when we do not properly store the size of the data input
into our applications , causing the program to crash and an attacker to take
advantage
Certificates –
CORRECT ANSWE R: link a public key to a particular individual and are often used
as a form of electronic identification for t hat particular person
Childrens ' Online Privacy Protection Act (CO PPA) –
CORRECT ANSWE R: sets rules on data collection for children under 13 to
protect their online privacy
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM
2024 ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS A+ GRADE
4/85