100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM2024 OBJECTIVE ASSESSMENT NEWEST TEST BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS ALREADY GRADED A+ $28.49   Add to cart

Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM2024 OBJECTIVE ASSESSMENT NEWEST TEST BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS ALREADY GRADED A+

 5 views  0 purchase
  • Course
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM2024 OBJECTIVE ASSESSMENT NEWEST TEST BANK ACTUAL EXAM 300 QUESTIONS AND CORRECT DETAILED ANSWERS ALREADY GRADED A+

Preview 2 out of 7  pages

  • August 3, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
chareiezekiel
WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY EXAM2024 OBJECTIVE ASSESSMENT NEWEST
TEST BANK ACTUAL EXAM 300 QUESTIONS AND
CORRECT DETAILED ANSWERS ALREADY GRADED A+


Define identity verification. - Someone claims who they are and you take it one step
father and ask for ID

Define authentication - A set of methods used to determine if a claim of identity is true.

Compare authentication types. - Multifactor authentication
Mutual authentication

Identify password security best practices. - Upper case
Lower case
Numbers
Symbols

Identify the factors involved in a multifactor authentication technique. - Something you
do
Something you have
Where you are

Define accountability and its benefits - nonrepudiation, deterrence, intrusion detection
and prevention, and admissibility of records

Auditing - Hold users of your system accountable. A methodical examination and review
of an organization's records.

nonrepudiation measures - make it so that someone can't send an email and then deny
sending it. usually with a digital signature.

Which standards apply to any financial entity policies? - Gramm-Leech-Bliley

Which standards apply to publicly traded companies doing business in the U.S? -
Sarbanes-Oxley Act (SOX)

Which standards apply to credit card industry? - PCI DSS

Which characteristic falls under accountability? - Identity

, What company audits other companies for licensing requirements? - BSA

Define cryptography, including its origins and influencers. - The science of protecting
the confidentiality and integrity of data

symmetric key cryptography - the sender and receiver use the same key for encryption
and decryption

Asymmetric Key Cryptography - Encryption that uses two separate keys- a public key
and a private key. Advantage is that you can post the public key and anyone can send
you an encrypted message.

Hash functions - mathematical algorithms that generate a message summary or digest
(sometimes called a fingerprint) to confirm message identity and integrity

digital signature - a means of electronically signing a document with data that cannot be
forged

Digital certificate - Link a public key to an individual

Protecting data at rest - use encryption and physical security

Protecting data in motion - use encryption, protect the connection with a VPN,

Protecting data in use - We are somewhat limited in our ability to protect data while it is
being used by those who legitimately have access to it. Authorized users can print files,
move them to other machines or storage devices, etc.

Rivest-Shamir-Adleman - encryption algorithm

Which term is synonymous with symmetric cryptography? - Secret key cryptography

Which term is synonymous with asymmetric cryptography? - Public key cryptography

regulatory compliance - Regulations mandated by law usually requiring regular audits
and assessments

Define the confidentiality in the CIA triad. - Our ability to protect data from those who are
not authorized to view it.

Examples of confidentiality - A patron using an ATM card wants to keep their PIN
number confidential.
An ATM owner wants to keep bank account numbers confidential.

How can confidentiality be broken? - Losing a laptop

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller chareiezekiel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $28.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76202 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$28.49
  • (0)
  Add to cart