Package deal
WGU D430 fundamentals of information security Bundle
WGU D430 fundamentals of information security
[Show more]WGU D430 fundamentals of information security
[Show more]Information security 
protecting data, software, and hardware secure against unauthorized access, use, 
disclosure, disruption, modification, or destruction. 
Compliance 
The requirements that are set forth by laws and industry regulations. 
IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card indus...
Preview 3 out of 23 pages
Add to cartInformation security 
protecting data, software, and hardware secure against unauthorized access, use, 
disclosure, disruption, modification, or destruction. 
Compliance 
The requirements that are set forth by laws and industry regulations. 
IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card indus...
Information security - CORRECT ANSWER-Keeping data, software, and hardware 
secure against unauthorized access, use, disclosure, disruption, modification, or 
destruction. 
Compliance - CORRECT ANSWER-The requirements that are set forth by laws and 
industry regulations. Example : HIPPA/ HITECH- hea...
Preview 3 out of 20 pages
Add to cartInformation security - CORRECT ANSWER-Keeping data, software, and hardware 
secure against unauthorized access, use, disclosure, disruption, modification, or 
destruction. 
Compliance - CORRECT ANSWER-The requirements that are set forth by laws and 
industry regulations. Example : HIPPA/ HITECH- hea...
availability ( CIA Triad) 
refers to the ability to access our data when we need it. 
The Parkerian Hexad 
a less well-known model named after Donn Parker. A complex variation of the the 
classic CIA triad. It Consists of Confidentiality, integrity, availability as well as 
possession or control, au...
Preview 2 out of 15 pages
Add to cartavailability ( CIA Triad) 
refers to the ability to access our data when we need it. 
The Parkerian Hexad 
a less well-known model named after Donn Parker. A complex variation of the the 
classic CIA triad. It Consists of Confidentiality, integrity, availability as well as 
possession or control, au...
Which type of system is considered absolutely secure? 
A system that is shut off and disconnected from all networks. 
Which concept of the CIA Triad is associated with reliability? 
Integrity 
____________ ensures data has not been tampered with and is correct, authentic, and 
reliable. 
Integrity 
...
Preview 4 out of 36 pages
Add to cartWhich type of system is considered absolutely secure? 
A system that is shut off and disconnected from all networks. 
Which concept of the CIA Triad is associated with reliability? 
Integrity 
____________ ensures data has not been tampered with and is correct, authentic, and 
reliable. 
Integrity 
...
A company’s IT policy manual states that “All company computers, workstations, 
application servers, and mobile devices must have current versions of antivirus 
software.” Which principle or concept of cybersecurity does this policy statement 
impact? 
Operating system security 
An organizatio...
Preview 3 out of 19 pages
Add to cartA company’s IT policy manual states that “All company computers, workstations, 
application servers, and mobile devices must have current versions of antivirus 
software.” Which principle or concept of cybersecurity does this policy statement 
impact? 
Operating system security 
An organizatio...
information security - CORRECT ANSWER-"protecting information and 
information systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction." - US law 
protection of digital assets. 
secure - CORRECT ANSWER-it's difficult to define when you're truly secure. 
when ...
Preview 4 out of 42 pages
Add to cartinformation security - CORRECT ANSWER-"protecting information and 
information systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction." - US law 
protection of digital assets. 
secure - CORRECT ANSWER-it's difficult to define when you're truly secure. 
when ...
An organization wants to ensure that only authorized personnel can access sensitive 
data stored in a database. What security measure should be implemented for protecting 
data at rest? 
Access controls 
A company wishes to secure communication between its two branch offices over the 
internet. What...
Preview 3 out of 19 pages
Add to cartAn organization wants to ensure that only authorized personnel can access sensitive 
data stored in a database. What security measure should be implemented for protecting 
data at rest? 
Access controls 
A company wishes to secure communication between its two branch offices over the 
internet. What...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Hkane. Stuvia facilitates payment to the seller.
No, you only buy these notes for $17.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
80202 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now