WGU D430 Final Exam (D430 OA) – Questions/Answers
Explain PCI DCS Correct Ans - An information security standard used to handle credit card payments.
Explain HIPAA Correct Ans - For organizations that set a standard to protect sensitive healthcare and patient records
Explain FISMA (Federal Information Security Management Act) Correct Ans - Defines security standards for many federal agencies in the U.S.
Mandates government agencies to protect information systems.
Regulates federal departments in the United States.
Describe CIA triad Correct Ans - Confidentiality, Integrity, Availability- A Security concept in infosec.
Confidentiality Correct Ans - Our ability to protect our data from those who are not authorized to view it.
Integrity Correct Ans - The ability to prevent people from changing your data in an unauthorized or desirable manner.
Availability Correct Ans - The ability to access our data when we need it.
Describe Parkerian Hexad Correct Ans - Possession/control, Authenticity, and Utility, Confidentiality, Integrity, Availability.
Possession/Control Correct Ans - The physical disposition of the media on which the data is stored
Authenticity Correct Ans - Allows you to say whether you've attributed the data in question to the proper owner or creator.
Utility Correct Ans - How useful the data is to you.
Types of attacks in CIA categories Correct Ans - C-Interception I- Interruption, Modification, Fabrication
A-Interruption, Modification, Fabrication
Types of control Correct Ans - Physical, Logical/Technical, and Administrative control
Physical control example Correct Ans - fences, gates, locks, guard
Logical/Technical control example Correct Ans - passwords, encryption, firewalls, access controls, IDS
Administrative control example Correct Ans - rules, laws, policies, procedures, guidelines
Incident Response process Correct Ans - Preparation, Detection and analysis, Containment, Eradication, Recover, Post-incident activity.
What is Defense in depth Correct Ans - multilayered defense
What is a "Sandbox" Correct Ans - An isolated environment that protects
a set of resources
What is FTP (File Transfer Protocol) used for? Correct Ans - Used to transfer files
How ports does FTP use Correct Ans - port 20 & 21
What is IMAP (Internet Message Access Protocol) used for? Correct Ans - managing email.
what port does IMAP use Correct Ans - port 143
What is SSH (Secure Shell) used for? Correct Ans - To manage remote connections to systems
What port does SSH use? Correct Ans - port 22
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LeCrae. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.