100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT (2024/2025) TEST BANK ACTUAL EXAM 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED BY EXPERT) |ALREADY GRADED A+ <LATEST VERSION> $12.99   Add to cart

Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT (2024/2025) TEST BANK ACTUAL EXAM 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED BY EXPERT) |ALREADY GRADED A+ <LATEST VERSION>

 6 views  0 purchase
  • Course
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT (2024/2025) TEST BANK ACTUAL EXAM 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED BY EXPERT) |ALREADY GRADED A+ &lt;LATEST VERSION&gt; 5 steps of the operations security process - ANSWER 1.Identification of cr...

[Show more]

Preview 4 out of 116  pages

  • November 3, 2024
  • 116
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
ProfBenjamin
WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM
OBJECTIVE ASSESSMENT (2024/2025)
TEST BANK ACTUAL EXAM 500
QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED BY EXPERT)
|ALREADY GRADED A+
<LATEST VERSION>




5 steps of the operations security process - ANSWER ✔ 1.Identification of critical
information
2.Analysis of threats
3.Analysis of vulnerabilities
4.Assessment of risks
5.Application of countermeasures

If you don't know the threat, how do you know what to protect? - ANSWER ✔
The 1st Law of Haas' Laws of Operations Security

If you don't know what to protect, how do you know you are protecting it? -
ANSWER ✔ The 2nd Law of Haas' Laws of Operations Security

If you are not protecting it, the dragon wins! - ANSWER ✔ The 3rd Law of Haas'
Laws of Operations Security

, cloud computing - ANSWER ✔ services that are hosted, often over the Internet,
for the purposes of delivering easily scaled computing services or resources

identification of critical information - ANSWER ✔ 1st step in the OPSEC process,
arguably the most important: to identify the assets that most need protection and
will cause us the most harm if exposed

analysis of threats - ANSWER ✔ 2nd step in the OPSEC process: to look at the
potential harm or financial impact that might be caused by critical information
being exposed, and who might exploit that exposure

analysis of vulnerabilities - ANSWER ✔ 3rd step in the OPSEC process: to look
at the weaknesses that can be used to harm us

assessment of risks - ANSWER ✔ 4th step in the OPSEC process: to determine
what issues we really need to be concerned about (areas with matching threats and
vulnerabilities)

Hash functions - ANSWER ✔ mathematical algorithms that generate a message
summary or digest (sometimes called a fingerprint) to confirm message identity
and integrity

digital signature - ANSWER ✔ a means of electronically signing a document with
data that cannot be forged

Digital certificate - ANSWER ✔ Link a public key to an individual

Protecting data at rest - ANSWER ✔ use encryption and physical security

Protecting data in motion - ANSWER ✔ use encryption, protect the connection
with a VPN,

Protecting data in use - ANSWER ✔ We are somewhat limited in our ability to
protect data while it is being used by those who legitimately have access to it.
Authorized users can print files, move them to other machines or storage devices,
etc.

Rivest-Shamir-Adleman - ANSWER ✔ encryption algorithm

,Which term is synonymous with symmetric cryptography? - ANSWER ✔ Secret
key cryptography

Which term is synonymous with asymmetric cryptography? - ANSWER ✔ Public
key cryptography

regulatory compliance - ANSWER ✔ Regulations mandated by law usually
requiring regular audits and assessments

industry compliance - ANSWER ✔ Regulations or standards designed for specific
industries that may impact ability to conduct business (e.g. PCI DSS)

privacy - ANSWER ✔ the right of people not to reveal information about
themselves

GLBA - ANSWER ✔ "Graham-Leach-Bliley Act" (Financial Services
Modernization Act of 1999) repealed a 1933 law that barred the consolidation of
financial institutions and insurance companies. Included within GLBA are multiple
sections relating to the privacy of financial information. Companies must provide
written notice to consumers of their privacy rights and explain the company's
procedures for safeguarding data.

Privacy guidelines - ANSWER ✔ Guidelines to follow to protect private
information of patients

FISMA - ANSWER ✔ federal info security management act - US law requires
federal agencies to create, document and implement security program

HIPPA - ANSWER ✔ Health Insurance Portability and Accountability Act.
Protects patient privacy.

FERPA - ANSWER ✔ Family Educational Rights and Privacy Act

SOX - ANSWER ✔ Sarbanes-Oxley Act. This law requires publicly traded
companies and their independent auditors to demonstrate that their numbers are
accurate and that they have processes in place to ensure accurate reporting. Several
sections of the law have important implications for human resource activities.

, Industry compliance vs. Regulatory compliance - ANSWER ✔ Industry
compliance isn't enforced by the government, like regulatory compliance. It's a
group of stakeholders in the industry that get together and decide what compliance
looks like.

COPPA - ANSWER ✔ Children's Online Privacy Protection Act

ECC - ANSWER ✔ Asymmetric Key Algorithm, provides encryption, digital
signatures, key exchange, based on the idea of using points on a curve to define the
public/private key, used in wireless devices and smart cards

RSA - ANSWER ✔ asymmetric algorithm

SHA - ANSWER ✔ hashing algorithm

DES - ANSWER ✔ block cipher symmetric algorithm

MD5 - ANSWER ✔ Message Digest 5. A hashing function used to provide
integrity.

PGP - ANSWER ✔ Pretty Good Privacy. Commonly used to secure e-mail
communications between two private individuals but is also used in companies. It
provides confidentiality, integrity, authentication, and non-repudiation. It can
digitally sign and encrypt e-mail. It uses both asymmetric and symmetric
encryption.

Operations Security Process - ANSWER ✔ 1. Identification of critical information
2. Analysis of threats
3. Analysis of vulnerabilities
4. Assessment of risks
5. Application of countermeasures

Operations Security - ANSWER ✔ A security and risk management process that
prevents sensitive information from getting in the wrong hands.

Competitive intelligence - ANSWER ✔ the process of gathering and analyzing
information to support business decisions

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ProfBenjamin. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78075 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart