100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL EXAM OBJECTIVE ASSESSMENT COMPLETE QUESTIONS AND ANSWERS NEWEST 2024 TEST BANK ACTUAL EXAM QUESTIONS AND CORRECT [PASSED] $14.99   Add to cart

Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL EXAM OBJECTIVE ASSESSMENT COMPLETE QUESTIONS AND ANSWERS NEWEST 2024 TEST BANK ACTUAL EXAM QUESTIONS AND CORRECT [PASSED]

 16 views  3 purchases
  • Course
  • WGU D430
  • Institution
  • WGU D430

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL EXAM OBJECTIVE ASSESSMENT COMPLETE QUESTIONS AND ANSWERS NEWEST 2024 TEST BANK ACTUAL EXAM QUESTIONS AND CORRECT [PASSED]

Preview 4 out of 39  pages

  • August 18, 2024
  • 39
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu d430
  • WGU D430
  • WGU D430
avatar-seller
MEGAMINDS
WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY ACTUAL EXAM OBJECTIVE
ASSESSMENT COMPLETE QUESTIONS AND
ANSWERS NEWEST 2024 TEST BANK ACTUAL
EXAM QUESTIONS AND CORRECT [PASSED]



Information security - Correct answer - Keeping data,
software, and hardware secure against unauthorized access,
use, disclosure, disruption, modification, or destruction.


Utility - Correct answer - How useful the data is to us


Types of attacks - Correct answer - 1- interception
2- interruption
3- modification
4- fabrication


Interception - Correct answer - Attacks allows unauthorized
users to access our data, applications, or environments. Are
primarily an attack against confidentiality

,Interruption - Correct answer - Attacks cause our assets to
become unstable or unavailable for our use, on a temporary or
permanent basis. This attack affects availability but can also
attack integrity


Modification - Correct answer - Attacks involve tampering
with our asset. Such attacks might primarily be considered an
integrity attack, but could also be an availability attack.


Fabrication - Correct answer - Attacks involve generating
data, processes, communications, or other similar activities
with a system. Attacks primarily affect integrity but can be
considered an availability attack.


Compliance - Correct answer - The requirements that are set
forth by laws and industry regulations. Example : HIPPA/
HITECH- healthcare, PCI/DSS- payment card industry, FISMA-
federal government agencies


CIA - Correct answer - The core model of all information
security. Confidential, integrity and availability


Confidential - Correct answer - Allowing only those
authorized to access the data requested

,integrity - Correct answer - Keeping data unaltered by
accidental or malicious intent


Availability - Correct answer - The ability to access data when
needed


Parkerian hexad model - Correct answer - Confidentiality ,
integrity, availability, possession/control, authenticity, utility


Possession/ control - Correct answer - Refers to the physical
disposition of the media on which the data is stored


authenticity - Correct answer - Allows us to talk about the
proper attribution as to the owner or creator of the data in
question


Risk - Correct answer - The likelihood that a threat will occur.
There must be a threat and vulnerability


Threat - Correct answer - Any event being man-made, natural
or environmental that could damage the assets

, Vulnerabilities - Correct answer - Weakness that a threat
event or the threat can take advantage of


Impact - Correct answer - taking into account the assets cost


Controls - Correct answer - The ways we protect assets.
Physical, technical/ logical, and administrative


Physical controls - Correct answer - Controls are physical
items that protect assets. Think of locks, doors, guards and
fences


Technical/ logical controls - Correct answer - Controls are
devices and software that protect assets. Think of firewalls, av,
ids, and ips


Administrative controls - Correct answer - Controls are the
policies that organizations create for governance. Ex: email
policies

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MEGAMINDS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

73216 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99  3x  sold
  • (0)
  Add to cart