100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D430 Fundamentals of Information Security || Error-free Answers 100%.

Puntuación
-
Vendido
-
Páginas
11
Grado
A+
Subido en
30-08-2025
Escrito en
2025/2026

Define the confidentiality in the CIA triad. correct answers Our ability to protect data from those who are not authorized to view it. Examples of confidentiality correct answers A patron using an ATM card wants to keep their PIN number confidential. An ATM owner wants to keep bank account numbers confidential. How can confidentiality be broken? correct answers Losing a laptop An attacker gets access to info A person can look over your shoulder Define integrity in the CIA triad. correct answers The ability to prevent people from changing your data and the ability to reverse unwanted changes. How do you control integrity? correct answers Permissions restrict what users can do (read, write, etc.) Examples of integrity correct answers Data used by a doctor to make medical decisions needs to be correct or the patient can die. Define the availability in the CIA triad. correct answers Our data needs to be accessible when we need it. How can availability be broken? correct answers Loss of power, application problems. If caused by an attacker, this is a Denial of Service attack.

Mostrar más Leer menos
Institución
Fundamentals Of Information Security
Grado
Fundamentals of Information Security









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Fundamentals of Information Security
Grado
Fundamentals of Information Security

Información del documento

Subido en
30 de agosto de 2025
Número de páginas
11
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D430 Fundamentals of Information Security || Error-free
Answers 100%.


Define the confidentiality in the CIA triad. correct answers Our ability to protect data from those
who are not authorized to view it.


Examples of confidentiality correct answers A patron using an ATM card wants to keep their PIN
number confidential.
An ATM owner wants to keep bank account numbers confidential.


How can confidentiality be broken? correct answers Losing a laptop
An attacker gets access to info
A person can look over your shoulder


Define integrity in the CIA triad. correct answers The ability to prevent people from changing
your data and the ability to reverse unwanted changes.


How do you control integrity? correct answers Permissions restrict what users can do (read,
write, etc.)


Examples of integrity correct answers Data used by a doctor to make medical decisions needs to
be correct or the patient can die.


Define the availability in the CIA triad. correct answers Our data needs to be accessible when we
need it.


How can availability be broken? correct answers Loss of power, application problems. If caused
by an attacker, this is a Denial of Service attack.

, Define information security. correct answers The protection of information and information
systems from unauthorized access, use, disclosure, disruption, modification, or destruction in
order to provide confidentiality, integrity, and availability.


Define the Parkerian Hexad and its principles. correct answers The Parkerian Hexad includes
confidentiality, integrity, and availability from the CIA triad. It also includes possession (or
control), authenticity, and utility.


Authenticity correct answers Whether the data in question comes from who or where it says it
comes from (i.e. did this person actually send this email?)


Confidentiality is affected by what type of attack? correct answers Interception (eaves dropping)


Integrity is affected by what type of attacks? correct answers Interruption (assets are unusable),
modification (tampering with an asset), fabrication (generating false data)


Authenticity is affected by what type of attacks? correct answers Interruption (assets are
unusable), modification (tampering with an asset), fabrication (generating false data)


Utility correct answers How useful the data is to you (can be a spectrum, not just yes or no)


Possession correct answers Do you physically have the data in question? Used to describe the
scope of a loss


Identify the four types of attacks correct answers interception, interruption, modification, and
fabrication


Interception attacks correct answers Make your assets unusable or unavailable
$12.09
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
737
Miembro desde
3 año
Número de seguidores
437
Documentos
34833
Última venta
3 días hace
Reign Supreme Scholarly || Enlightened.

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lee mas Leer menos
3.7

110 reseñas

5
46
4
20
3
22
2
8
1
14

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes