100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS/A+ GRADE$9.69
Add to cart
WGU D430 FUNDAMENT ALS OF INFORMA TION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DET AILED ANSWERS/A+ GRADE WGU D430 FINAL EXA M Access Control List – CORRECT ANSWE R: info ab out what kind of access certain parties are allowed to hav e a given sy stem to
Read , write , execu te Access Control Models –
CORRECT ANSWE R: Discr etionary ( DAC ) Mandator y ( MA C ) Rule - based Role - based ( RBA C ) Attribute - based ( ) ABAC Accountability – CORRECT ANSWER: Refers to making sure that a person respon sible for their ac tions . is
-It provides us with the m eans trace acti vities our env ironment back their to in to
source -Depends on identification , au thentication , an d access control being presen t so
that can know who a given tran sactio n is associated with , and what we
permissions were used to allow them to ca rry it out . 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
about:blank 1/85 Acess Control – CORRECT ANSWER : Allowing - let s give a particular party us access to a given source Deny ing - opposite gainin g access of
Limiting - allowin g some access our resour ce , only a cert ain point to up to
Revoking - ta kes a ccess away from former user AES – CORRECT ANSWE R: uses three dif ferent ciphers : one with a 128 - bit key , one with a 192 - bit key , and one with a 25 6 - bi t key , all hav ing a block length of 128 bits Asymm etric cryptography – CORRECT ANSWE R: a public key and a pr ivate key . The public key is used to encry pt data sent from the sender to the r eceiver and is shared with every one . Private keys are used to decry pt data that arrives at t he receivin g end and are very carefully guarded by the receive ( aka the public key cryptography ) Asymm etric Key Algorithm s – CORR ECT ANSWER : Secure Sockets Layer ( RSA ) Elliptic Cu rve Cryptography ( E CC ) Pretty Good Privacy ( PGP ) Transp ort Layer Security ( TLS ) Attack Types –5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
about:blank 2/85 CORRECT ANSWER : Interception Interruption Modification Fabrica tion Attack types and their ef fect –
CORRECT ANSWER: Interception is the ONL Y attack that a ffects on
confidentiality . Interruption, modification, and fabrication af fects inte grity and availability because most of the time they 're impacting data. Attribute - based ( ABAC ) - CORRECT ANSWER : based on attributes , such as of a person , resource , or an env ironment Auditing –
CORRECT ANSWE R: the examination and review of an organization's records ensure accountability thr ough technical means . to Authentication –
CORRECT ANSWER : verifying that a perso n who th ey claim is to be Authorization – CORRECT ANSWER : what the user can access , modify , and delete Availability –
CORRECT ANSWE R: For o ne's AUTHORIZED to ACCESS data w hen needed 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
about:blank 3/85 BinScope Binary Analyzer – CORRECT ANSWE R: a tool developed by Microsoft to examine source code for general good practices Block Cipher –
CORRECT ANSWE R: takes a predetermined num ber bits , kn own of as a block , in the plaintext message and encrypts that block Brute Force –
CORRECT ANSWER : an attack by submitti ng password attempts until eventually guessed correctly Buffer overflows –
CORRECT ANSWE R: a vulnerab ility that occurs when we do not properly store the size of the data in put into our applications , causing the program crash and an attacker to take to
advantage Certificates –
CORRECT ANSWE R: link a public a particular in dividual and are often used key to
as a form of electronic i dentification for t hat particular person Childrens ' Online Privacy Protection Act (CO PPA) –
CORRECT ANSWE R: sets rules on data coll ectio n for ch ildren un der 13 to
protect t heir online priv acy 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
about:blank 4/85
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller SuccessMaestro. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.69. You're not tied to anything after your purchase.