WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL UPDATED EXAM||100%
ACCURATE PASS
3DES - CORRECT ANSWER: DES used to encrypt each block three times , each with
a different key
Access Control List - CORRECT ANSWER: info about what kind of access certain
parties are allowed to have to a given system
Read , write , execute
Access Control Models - CORRECT ANSWER: Discretionary ( DAC )
Mandatory ( MAC )
Rule - based
Role - based ( RBAC )
Attribute - based ( ABAC )
Accountability - CORRECT ANSWER: Refers to making sure that a person is
responsible for their actions .
-It provides us with the means to trace activities in our environment back to their source
.
-Depends on identification , authentication , and access control being present so that we
can know who a given transaction is associated with , and what permissions were used
to allow them to carry it out .
Acess Control - CORRECT ANSWER: Allowing - lets us give a particular party access
to a given source
Denying - opposite of gaining access
Limiting - allowing some access to our resource , only up to a certain point
Revoking - takes access away from former user
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL UPDATED EXAM||100% ACCURATE PASS
, AES - CORRECT ANSWER: uses three different ciphers : one with a 128 - bit key ,
one with a 192 - bit key , and one with a 256 - bit key , all having a block length of 128
bits
Asymmetric cryptography - CORRECT ANSWER: a public key and a private key . The
public key is used to encrypt data sent from the sender to the receiver and is shared
with everyone . Private keys are used to decrypt data that arrives at the receiving end
and are very carefully guarded by the receive ( aka the public key cryptography )
Attack types and their effect - CORRECT ANSWER: Interception is the ONLY attack
that affects on confidentiality. Interruption, modification, and fabrication affects integrity
and availability because most of the time they're impacting data.
Attribute - based ( ABAC ) - CORRECT ANSWER: based on attributes , such as of a
person , resource , or an environment
Auditing - CORRECT ANSWER: the examination and review of an organization's
records to ensure accountability through technical means .
Authentication - CORRECT ANSWER: verifying that a person is who they claim to be
Authorization - CORRECT ANSWER: what the user can access , modify , and delete
Availability - CORRECT ANSWER: For one's AUTHORIZED to ACCESS data when
needed
BinScope Binary Analyzer - CORRECT ANSWER: a tool developed by Microsoft to
examine source code for general good practices
Block Cipher - CORRECT ANSWER: takes a predetermined number of bits , known as
a block , in the plaintext message and encrypts that block
Brute Force - CORRECT ANSWER: an attack by submitting password attempts until
eventually guessed correctly
Buffer overflows - CORRECT ANSWER: a vulnerability that occurs when we do not
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL UPDATED EXAM||100% ACCURATE PASS
, properly store the size of the data input into our applications , causing the program to
crash and an attacker to take advantage
Certificates - CORRECT ANSWER: link a public key to a particular individual and are
often used as a form of electronic identification for that particular person
Childrens ' Online Privacy Protection Act (COPPA) - CORRECT ANSWER: sets rules
on data collection for children under 13 to protect their online privacy
CIA Triad - CORRECT ANSWER: Confidential - allowing only those authorized to
access the data requested
Integrity - keeping data unaltered in an unauthorized manner and reliable
Availability - the ability for those authorized to access data when needed
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL UPDATED EXAM||100% ACCURATE PASS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Edumaxsolutions. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.79. You're not tied to anything after your purchase.