Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about ? On this page you'll find 518 study documents about .
Page 3 out of 518 results
Sort by
![WGU D430 fundamentals of information security Post Exam With Complete Solutions 2024.](/docpics/5305553/66441f9eaf36c_5305553_121_171.jpeg)
-
WGU D430 fundamentals of information security Post Exam With Complete Solutions 2024.
- Exam (elaborations) • 21 pages • 2024
-
Available in package deal
-
- $9.99
- + learn more
Information security - Answer Keeping data, software, and hardware secure against unauthorized access, use, disclosure, disruption, modification, or destruction. 
 
Compliance - Answer The requirements that are set forth by laws and industry regulations. Example : HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal government agencies 
 
CIA - Answer The core model of all information security. Confidential, integrity and availability 
 
Confidential - Answer All...
![Wgu Foundation of IT Test Questions And Verified Answers 2024.](/docpics/5305550/66441f60cd20d_5305550_121_171.jpeg)
-
Wgu Foundation of IT Test Questions And Verified Answers 2024.
- Exam (elaborations) • 5 pages • 2024
-
Available in package deal
-
- $9.69
- + learn more
Which tool should an application developer use to help identify input validation vulnerabilities? - Answer A Fuzzer 
 
Which cybersecurity term is defined as the potential for an attack on a resource ? - Answer Threat 
 
Which security type deliberately exposes a system's vulnerabilities or resources to an attacker - Answer Honeypots 
 
Which tool can be used to map devices on a network, along with their operating system types and versions? - Answer Port scanner 
 
Which web attack is p...
![WGU Fundamentals of Information Security D430 Final Exam Questions And Answers 2024.](/docpics/5305545/66441f279e0c8_5305545_121_171.jpeg)
-
WGU Fundamentals of Information Security D430 Final Exam Questions And Answers 2024.
- Exam (elaborations) • 13 pages • 2024
-
Available in package deal
-
- $9.79
- + learn more
CIA Triad - Answer Confidential - allowing only those authorized to access the data requested 
Integrity - keeping data unaltered in an unauthorized manner and reliable 
Availability - the ability for those authorized to access data when needed 
 
Parkerian Hexad - Answer Confidentiality Integrity Availability 
Possession - physical deposition of the media on which the data is stored 
Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data i...
![Wgu Fundamentals of Information Security Exam Questions And Verified Answers 2024.](/docpics/5305541/66441ea7da483_5305541_121_171.jpeg)
-
Wgu Fundamentals of Information Security Exam Questions And Verified Answers 2024.
- Exam (elaborations) • 27 pages • 2024
-
Available in package deal
-
- $9.99
- + learn more
Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______. - Answer Logical Controls 
 
During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again? - Answer Post-Incident Activity 
 
Something that has the potential to cause harm to our assets is known as a(n) ________. - Answer Threat 
 
What is the first and arguably one of the...
![Wgu Progressive Era key Terms Practice Exam With Verified Updated Answers 2024.](/docpics/5305539/66441e6a99b71_5305539_121_171.jpeg)
-
Wgu Progressive Era key Terms Practice Exam With Verified Updated Answers 2024.
- Exam (elaborations) • 3 pages • 2024
-
Available in package deal
-
- $9.69
- + learn more
Muckrakers - Answer to search for and expose real or alleged corruption, scandal, or the like, especially in politics 
 
The Jungle - Answer a novel (1906) by Upton Sinclair. 
 
Jane Addams - Answer American social reformer and pacifist who founded Hull House (1889), a care and education center for the poor of Chicago. She shared the 1931 Nobel Peace Prize. 
 
Hull House - Answer a settlement house in Chicago, Ill., founded in 1889 by Jane Addams. 
 
Temperance Movement - Answer R...
![WGU VULNERABILITY AND THREAT EXAM QUESTIONS AND ANSWERS 2024.](/docpics/5305532/66441dfdee678_5305532_121_171.jpeg)
-
WGU VULNERABILITY AND THREAT EXAM QUESTIONS AND ANSWERS 2024.
- Exam (elaborations) • 4 pages • 2024
-
- $9.69
- + learn more
Explain the difference between a vulnerability and a threat. - Answer Vulnerability is a flaw, weakness, or gap in a system and threat is exploiting a vulnerability. 
 
A key would be described as which type of authentication factor? - Answer something you have 
 
List five items that might be considered logical controls - Answer Firewalls, 
logical access control, 
passwords, 
encryption 
 intrusion detection control 
 
What term might we use to describe the usefulness of data? - A...
C836 - Fundamentals of Information Security Study Notes
C836 - Fundamentals of Information Security
C836 Ch.2
C836 Ch.4
![Verkoop je kennis op stuvia](https://www.stuvia.com/hosted-imgs/app/stock-fotos/banner_seller_big.jpg)
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia