WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024 /ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETA ILED ANS WERS/A+ GRADE
WGU D430 FINAL EXA M
Access Control List –
CORRECT ANSWE R: info ab out what kind of access certain parties are
allowed to hav e to a given sy stem
Read , write , execu te
Access Control Models –
CORRECT ANSWE R : Discr etionary ( DAC ) Mandator y ( MA C )
Rule - based
Role - based ( RBA C )
Attribute - based ( ABAC )
Accountability –
CORRECT A NSWER:
Refers to making sure that a person is responsible for their ac tions .
-It provides us wit h the m eans to trace acti vities in our env ironment back to their
source
-Depends on identification , au thentication , an d access control being presen t so
that we can know who a given tran saction is associated with , and what
permissions were used to allow them to ca rry it out .
about:blank 1/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
Acess Control –
CORRECT A NSWER : Allowing - let s us give a particular party access to a given
source
Denying - opposite of gaining access
Limiting - allowin g so me access to our resour ce , only up to a cert ain point
Revoking - ta kes access away from former user
AES –
CORRECT ANSWE R : uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 25 6 - bit key , all hav ing a block length of 128
bits
Asymm etri c cryptography –
CORRECT ANSWE R: a public key and a pr ivate key . The public key is used to
encrypt d ata sent from the sender to the r eceiver and is shared with every one .
Private keys are used to decrypt d ata that arrives at t he receivin g end and are
very carefully guarded by the receive ( aka the public key cryptography )
Asymm etri c Key Algorithm s –
CORRECT ANS WER:
Secure Sockets Layer ( RSA ) Elliptic Cu rve Cryptography ( E CC )
Pretty Good Privacy ( PGP )
T ransport Layer Security (
TLS )
Attack Types –
about:blank 2/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
CORRECT A NSWER : Interception Interruption
Modification
Fabrica tion
Attack types and their effect –
CORRECT ANS W ER: Interception is the ONLY attack that a ffects on
confidentiality. I nterruption, modification, and fabrication affects inte gritya nd
availability because most of the time they 're impacting data.
Attri bute - based ( AB AC )
- CORRECT ANSWER : based on attributes , such as of a p erson , resource , or
an environment
Auditing –
CORRECT ANSWE R : the examination and review of an organization's
records to ensure accountability thr ough technical means .
Authentication –
CORRECT A NSWER : verifying that a perso n is who th ey claim to be
Authorization –
CORRECT ANS WER: what the user can access , modify , and delete
Availability –
CORRECT ANSWE R : For o ne's AUT HORIZED to A CCESS data w hen needed
about:blank 3/85
, 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
BinScope Binary Analyzer –
CORRECT ANSWE R: a to ol developed by Microsoft to examine source code
for general good practices
Block Cipher –
CORRECT ANSWE R : takes a predetermined num ber of bits , kn own as a block , in th e
plaintext message and encrypts that block
Brute Force –
CORRECT A NSWER : an attack by submitting password attempts until eventually
guessed correctly
Buffer overflows –
CORRECT ANSWE R :
a vu lnerab ility that occurs when we do not properly store the size of the data in put
into our applications , causing the program to crash and an attacker to take
advantage
Certificates –
CORRECT ANSWE R : link a public key to a particular in dividual and are often used
as a form of electronic i dentification for t hat particular person
Childrens ' Online Privacy Protection Act (CO PPA) –
CORRECT ANSWE R : sets rules on data collectio n for ch ildren un der 13 to
protect t heir online priv acy
about:blank 4/85