100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025 LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS WITH COMPLETE SOLUTIONS

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A+
Geüpload op
20-01-2025
Geschreven in
2024/2025

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025 LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS WITH COMPLETE SOLUTIONS

Instelling
Vak

Voorbeeld van de inhoud

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY 2025
LATEST VERSION EXAM FREQUENTLY TESTED QUESTIONS
WITH COMPLETE SOLUTIONS

3DES - CORRECT ANSWER: DES used to encrypt each block three times , each with a
different key

Access Control List - CORRECT ANSWER: info about what kind of access certain
parties are allowed to have to a given system
Read , write , execute

Access Control Models - CORRECT ANSWER: Discretionary ( DAC ) Mandatory
( MAC )
Rule - based
Role - based ( RBAC )
Attribute - based ( ABAC )

Accountability - CORRECT ANSWER: Refers to making sure that a person is
responsible for their actions .
-It provides us with the means to trace activities in our environment back to their source
.
-Depends on identification , authentication , and access control being present so that we
can know who a given transaction is associated with , and what permissions were used
to allow them to carry it out .

Acess Control - CORRECT ANSWER: Allowing - lets us give a particular party access to
a given source
Denying - opposite of gaining access
Limiting - allowing some access to our resource , only up to a certain point
Revoking - takes access away from former user

AES - CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128 bits

Asymmetric cryptography - CORRECT ANSWER: a public key and a private key . The
public key is used to encrypt data sent from the sender to the receiver and is shared
with everyone . Private keys are used to decrypt data that arrives at the receiving end
and are very carefully guarded by the receive ( aka the public key cryptography )

Asymmetric Key Algorithms - CORRECT ANSWER: Secure Sockets Layer ( RSA )
Elliptic Curve Cryptography ( ECC )
Pretty Good Privacy ( PGP )
Transport Layer Security ( TLS )

, Attack Types - CORRECT ANSWER: Interception
Interruption
Modification
Fabrication

Attack types and their effect - CORRECT ANSWER: Interception is the ONLY attack
that affects on confidentiality. Interruption, modification, and fabrication affects
integrity and availability because most of the time they're impacting data.

Attribute - based ( ABAC ) - CORRECT ANSWER: based on attributes , such as of a
person , resource , or an environment

Auditing - CORRECT ANSWER: the examination and review of an organization's
records to ensure accountability through technical means .

Authentication - CORRECT ANSWER: verifying that a person is who they claim to be

Authorization - CORRECT ANSWER: what the user can access , modify , and delete

Availability - CORRECT ANSWER: For one's AUTHORIZED to ACCESS data when
needed

BinScope Binary Analyzer - CORRECT ANSWER: examine
a tool developed by Microsoft to
source code for general good practices

Block Cipher - CORRECT ANSWER: takes a predetermined number of bits , known as a
block , in the plaintext message and encrypts that block

Brute Force - CORRECT ANSWER: an attack by submitting password attempts until
eventually guessed correctly

Buffer overflows - CORRECT ANSWER: a vulnerability that occurs when we do not
properly store the size of the data input into our applications , causing the program to
crash and an attacker to take advantage

Certificates - CORRECT ANSWER: link a public key to a particular individual and are
often used as a form of electronic identification for that particular person

Childrens ' Online Privacy Protection Act (COPPA) - CORRECT ANSWER: sets rules
on data collection for children under 13 to protect their online privacy

CIA Triad - CORRECT ANSWER: Confidential - allowing only those authorized to
access the data requested
Integrity - keeping data unaltered in an unauthorized manner and reliable
Availability - the ability for those authorized to access data when needed

, Compliance - CORRECT ANSWER: conforming to a rule , such as specification , policy
, standard or law

Confidentiality - CORRECT ANSWER: WHO can access the data

Containment - CORRECT ANSWER: involves taking steps to ensure that the situation
does not cause any more damage than it already has , or to at least lessen any ongoing
harm

Cross - Site Scripting ( XSS ) - CORRECT ANSWER: an attack carried out by placing
code in the form of a scripting language into a Web page , or other media , that is
interpreted by a client browser , including Adobe Flash animation and some types of
video files

Cryptography - CORRECT ANSWER: the practice of keeping information secure
through the use of codes and ciphers

DDOS - CORRECT ANSWER: a type of cyber attack where an attacker floods a website
or network with so much traffic that it becomes unavailable to legitimate users .

Deep packet inspection - CORRECT ANSWER: analyzing the actual content of the
traffic that is flowing through them

Defense in-Depth - CORRECT ANSWER: using a variety of security measures that will
still achieve a successful defense should one or more of the defensive measures fail

DES - CORRECT ANSWER: a block cipher based on symmetric key cryptography and
uses a 56 - bit key . Not that secured any more .

Detection and Analysis (Identification) - CORRECT ANSWER: detect the occurrence of
an issue and decide whether or not it is actually an incident so that we can respond
appropriately to it .

Digital Signatures - CORRECT ANSWER: ensure that the message was legitimately sent
by the expected party , and to prevent the sender from denying that he or she sent the
message , known as nonrepudiation

Discretionary ( DAC ) - CORRECT ANSWER: owner of resources determines who gets
access and what level

DMZ - CORRECT ANSWER: a layer of protection that separates a device from the rest of
a network and used to host public facing services such as websites .

Elliptic Curve Cryptography ( ECC ) - CORRECT ANSWER: can secure all browser
connections to the Web servers

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
20 januari 2025
Aantal pagina's
26
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,47
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
ngunyisteve

Maak kennis met de verkoper

Seller avatar
ngunyisteve Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
1 jaar
Aantal volgers
0
Documenten
15
Laatst verkocht
-
NGUNYISTEVE

WE ALL KOW STUDYING CAN BE STRESSFUL.WITH VERIFIED AND CORRECT STUDY MATERIAL WE AIM TO MAKE IT SMOOTH AS POSSIBLE.WISHING YOU THE UTMOST SUCCESS

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen