WGU C836/D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM 2024, PRACTICE EXAM TEST BANK
QUESTIONS AND ANSWERS |
| GRADED A
WGU C836/D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM 2024, PRACTICE EXAM TEST BANK
QUESTIONS AND ANSWERS |
| GRADED A
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURIT
All documents for this subject (1)
1
review
By: DrReiss • 5 months ago
very helpful
Seller
Follow
erickarimi
Reviews received
Content preview
WGU C836/D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM 2024, PRACTICE EXAM TEST BANK
QUESTIONS AND ANSWERS |
| GRADED A
A VPN connection that is set to time out after 24 hours is demonstrating which model of access
control?
A Role-based access control
B Attribute-based access control
C Discretionary access control
D Mandatory access control
B
Confidential Services Inc. is a military-support branch consisting of 1,400 computers with
Internet access and 250 servers. All employees are required to have security clearances. From the
options listed below, what access control model would be most appropriate for this organization?
A Discretionary access control
B Role-based access control
C Attribute-based access control
D Mandatory access control
D
Nessus is an example of a(n) tool.
A Penetration testing
B Vulnerability scanning
C Anti-malware
D Anti-virus
E Fuzzing
B
Your organization's network was recently the target of an attack. Fortunately, the new system
you installed took action and refused traffic from the source before you even had a chance to
respond. What system did you install?
,A An authorization system
B An intrusion detection system
C A logging system
D An intrusion prevention system
E An authentication system
D
A surveillance video log contains a record, including the exact date and time, of an individual
gaining access to his company's office building after hours. He denies that he was there during
that time, but the existence of the video log proves otherwise. What benefit of accountability
does this example demonstrate?
A Authorization
B Deterrence
C Nonrepudiation
D Intrusion detection and prevention
E Authentication
C
What process ensures compliance with applicable laws, policies, and other bodies of
administrative control, and detects misuse?
A Deterrence
B Nonrepudiation
C Authorization
D Accountability
E Auditing
E
provides us with the means to trace activities in our environment back to their
source.
A Accountability
B Authentication
C Access
D Nonrepudiation
E Authorization
A
Backordered Parts is a defense contractor that builds communications parts for the military. The
employees use mostly Web-based applications for parts design and information sharing. Due to
the sensitive nature of the business, Backordered Parts would like to implement a solution that
secures all browser connections to the Web servers. What encryption solution best meets this
,company's needs?
A Advanced Encryption Standard (AES)
B Blowfish
C Elliptic Curve Cryptography (ECC)
D Digital signatures
C
Shovels and Shingles is a small construction company consisting of 12 computers that have
Internet access. The company is concerned that a wily, computer-savvy competitor will send e-
mail messages pretending to be from Shovels and Shingles to its customers, in an attempt to
gather customer information. What encryption solution best prevents a competitor from
successfully impersonating the company?
A Elliptic Curve Cryptography (ECC)
B Blowfish
C SSL
D Advanced Encryption Standard (AES)
E Digital signatures
E
Hashes provide , but not .
A Integrity, confidentiality
B Availability, integrity
C Confidentiality, availability
D Confidentiality, integrity
E Integrity, availability
A
The science of breaking through encryption is known as .
A Cryptology
B Cryptography
C Cryptanalysis
D Ciphertext
C
We are somewhat limited in our ability to protect which type of data?
A Data in use
B Data at rest
C Data in motion
, A
Some standards are not mandated by law but are managed and enforced by the industry, often via
a council or committee. Which of the options below is an example of this industry compliance?
A FISMA
B PCI DSS
C SOX
D HIPAA
E GLBA
B
sets limits on the use and disclosure of patient information and grants individuals rights
over their own health records.
A HIPAA
B SOX
C GLBA
D FERPA
E PCI DSS
A
ensures the protection of information, operations, and assets in federal government.
A SOX
B PCI DSS
C FERPA
D HIPAA
E FISMA
E
protects the privacy of students and their parents.
A PCI DSS
B FISMA
C HIPAA
D GLBA
E FERPA
E
regulates the financial practice and governance of corporations.
A FERPA
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller erickarimi. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $21.20. You're not tied to anything after your purchase.