100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY NEW EXAM UPDATE 2024 |QUESTIONS WITH CORRECT ANSWERS A+ GRADED $13.99   Add to cart

Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY NEW EXAM UPDATE 2024 |QUESTIONS WITH CORRECT ANSWERS A+ GRADED

 8 views  0 purchase
  • Course
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY NEW EXAM UPDATE 2024 |QUESTIONS WITH CORRECT ANSWERS A+ GRADED

Preview 4 out of 54  pages

  • August 27, 2024
  • 54
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
Ascorers
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY NEW
EXAM UPDATE 2024 |QUESTIONS WITH CORRECT ANSWERS A+
GRADED




1. Information security: protecting data, software, and hardware secure against
f f f f f f f f




f unauthorized access, use, disclosure, disruption, modification, or destruction.
f f f f f f f




2. Compliance: The requirements that are set forth by laws and industry regula-
f f f f f f f f f f f




f tions.


IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federa
f f f f f f f f f




f government agencies f




3. DAD Triad: Disclosure, alteration, and denial
f f f f f




4. CIA Triad: The core model of all information security concepts.
f f f f f f f f f




f Confidential, integrity and availability
f f f




5. Confidential: Ability to protect our data from those who are not authorized to
f f f f f f f f f f f f




f view it.
f




6. What ways can confidentiality be compromised?: - lose a personal laptop with
f f f f f f f f f f f




1 f/ f54

,f data

- Person can view your password you are entering in
f f f f f f f f




- Send an email attachment to the wrong person.
f f f f f f f




- Attacker can penetrate your systems.....etc.
f f f f




7. integrity: Keeping data unaltered by accidental or malicious intent
f f f f f f f f




8. How to maintain integrity?: Prevent unauthorized changes to the data and the
f f f f f f f f f f f




f ability to reverse unwanted authorized changes.
f f f f f




Via system/file permissions or Undo/Roll back undesirable changes.
f f f f f f f




9. Availability: The ability to access data when needed f f f f f f f




10.Ways Availability can be compromised: - Power loss
f f f f f f f




- Application issues f




- Network attacks f




- System compromised (DoS) f f




11.Denial of Service (DoS): Security problem in which users are not able to access
f f f f f f f f f f f f f




f an information system; can be caused by human errors, natural disaster,
f f or malicious
s to the
f f f f f f f f f
f
f
f


CIA
f

f activity.

12.Parkerian hexad model: A model that adds three more principle f f f f f f f f f



2 f/ f54

,f triad:


Possession/Control

f Utility

Authenticity

13.Possession/ control: Refers to the physical disposition of the media on which
f f f f f f f f f f f




f the data is stored; This allows you to discuss loss of data via its physical medium.
f f f f f f f f f f f f f f f




3 f/ f54

, 14.Principle of Possession example: Lost package (encrypted USB's and unen-
f f f f f f f f f




f crypted USB's) f




possession is an issue because the tapes are physically lost.
f f f f f f f f f




(Unencrypted is compromised via confidentiality and possession; encrypted is com-
f f f f f f f f f




f promised only via possession).
f f f




15.Principle of Authenticity: Allows you to say whether you've attributed the data
f f f f f f f f f f f




f in question to the proper owner/creator.
f f f f f




16.Ways authenticity can be compromised: Sending an email but altering the
f f f f f f f f f f




f message to look like it came from someone else, than the original one that was
f f f f f f f f f f f f f f




f sent.

17.Utility: How useful the data is to you. f f f f f f f




Ex. Unencrypted (a lot of utility) Encrypted (little utility).
f f f f f f f f




18.Security Attacks: Broken down from the type of attack, risk the attack repre-
f f f f f f f f f f f f




f sents, and controls you might use to mitigate it.
f f f f f f f f




19.Types of attacks: 1- interception
f f f f



4 f/ f54

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Ascorers. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart