100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS/A+ GRADE$17.99
Add to cart
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY FINAL EXAM AND PRACTICE EXAM 2024/ACTUAL EXAMS WITH 500 QUESTIONS AND CORRECT DETAILED ANSWERS/A+ GRADE
4 views 0 purchase
Course
Computer information systems
Institution
Computer Information Systems
WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024/ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETAILED ANSWERS/A+ GRADEWGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024/ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETAILED ANSWE...
5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
WGU D430 FUNDAMENTALS OF INFORMATION
SECURITY FINAL EXAM AND PRACTICE EXAM
2024 /ACTUAL EXAMS WITH 500 QUESTIONS AND
CORRECT DETA ILED ANS WERS/A+ GRADE
WGU D430 FINAL EXA M
Access Control List –
CORRECT ANSWE R: info ab out what kind of access certain parties are
allowed to hav e to a given sy stem
Read , write , execu te
Access Control Models –
CORRECT ANSWE R : Discr etionary ( DAC ) Mandator y ( MA C )
Rule - based
Role - based ( RBA C )
Attribute - based ( ABAC )
Accountability –
CORRECT A NSWER:
Refers to making sure that a person is responsible for their ac tions .
-It provides us wit h the m eans to trace acti vities in our env ironment back to their
source
-Depends on identification , au thentication , an d access control being presen t so
that we can know who a given tran saction is associated with , and what
permissions were used to allow them to ca rry it out .
about:blank 1/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
Acess Control –
CORRECT A NSWER : Allowing - let s us give a particular party access to a given
source
Denying - opposite of gaining access
Limiting - allowin g so me access to our resour ce , only up to a cert ain point
Revoking - ta kes access away from former user
AES –
CORRECT ANSWE R : uses three different ciphers : one with a 128 - bit key , one
with a 192 - bit key , and one with a 25 6 - bit key , all hav ing a block length of 128
bits
Asymm etri c cryptography –
CORRECT ANSWE R: a public key and a pr ivate key . The public key is used to
encrypt d ata sent from the sender to the r eceiver and is shared with every one .
Private keys are used to decrypt d ata that arrives at t he receivin g end and are
very carefully guarded by the receive ( aka the public key cryptography )
Asymm etri c Key Algorithm s –
CORRECT ANS WER:
Secure Sockets Layer ( RSA ) Elliptic Cu rve Cryptography ( E CC )
Pretty Good Privacy ( PGP )
T ransport Layer Security (
TLS )
Attack Types –
about:blank 2/85
,5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
CORRECT A NSWER : Interception Interruption
Modification
Fabrica tion
Attack types and their effect –
CORRECT ANS W ER: Interception is the ONLY attack that a ffects on
confidentiality. I nterruption, modification, and fabrication affects inte gritya nd
availability because most of the time they 're impacting data.
Attri bute - based ( AB AC )
- CORRECT ANSWER : based on attributes , such as of a p erson , resource , or
an environment
Auditing –
CORRECT ANSWE R : the examination and review of an organization's
records to ensure accountability thr ough technical means .
Authentication –
CORRECT A NSWER : verifying that a perso n is who th ey claim to be
Authorization –
CORRECT ANS WER: what the user can access , modify , and delete
Availability –
CORRECT ANSWE R : For o ne's AUT HORIZED to A CCESS data w hen needed
about:blank 3/85
, 5/7/24, 3:16 PM WGU D430 fundamentals of information security Exam Latest Update 2024 2…
BinScope Binary Analyzer –
CORRECT ANSWE R: a to ol developed by Microsoft to examine source code
for general good practices
Block Cipher –
CORRECT ANSWE R : takes a predetermined num ber of bits , kn own as a block , in th e
plaintext message and encrypts that block
Brute Force –
CORRECT A NSWER : an attack by submitting password attempts until eventually
guessed correctly
Buffer overflows –
CORRECT ANSWE R :
a vu lnerab ility that occurs when we do not properly store the size of the data in put
into our applications , causing the program to crash and an attacker to take
advantage
Certificates –
CORRECT ANSWE R : link a public key to a particular in dividual and are often used
as a form of electronic i dentification for t hat particular person
CORRECT ANSWE R : sets rules on data collectio n for ch ildren un der 13 to
protect t heir online priv acy
about:blank 4/85
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller DoctorKeyah. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.