Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY YEAR 2024/2025 / ACCURATE CURRENTLY TESTING EXAM VERSIONS WITH ACTUAL QUESTIONS AND DETAILED ANSWERS WITH A STUDY GUIDE / EXPERT VERIFIED FOR GURANTEED PASS / LATEST UPDATE. $24.49   Ajouter au panier

Examen

WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY YEAR 2024/2025 / ACCURATE CURRENTLY TESTING EXAM VERSIONS WITH ACTUAL QUESTIONS AND DETAILED ANSWERS WITH A STUDY GUIDE / EXPERT VERIFIED FOR GURANTEED PASS / LATEST UPDATE.

 19 vues  0 fois vendu
  • Cours
  • WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY
  • Établissement
  • WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY

WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY YEAR 2024/2025 / ACCURATE CURRENTLY TESTING EXAM VERSIONS WITH ACTUAL QUESTIONS AND DETAILED ANSWERS WITH A STUDY GUIDE / EXPERT VERIFIED FOR GURANTEED PASS / LATEST UPDATE.

Aperçu 4 sur 32  pages

  • 6 septembre 2024
  • 32
  • 2024/2025
  • Examen
  • Questions et réponses
  • wgu d430
  • wgu
  • WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION AND SECURITY
avatar-seller
DrMedinaReed
WGU D430 FUNDAMENTALS OF INFORMATION AND
SECURITY YEAR 2024/2025 / ACCURATE CURRENTLY
TESTING EXAM VERSIONS WITH ACTUAL QUESTIONS AND
DETAILED ANSWERS WITH A STUDY GUIDE / EXPERT
VERIFIED FOR GURANTEED PASS / LATEST UPDATE.

Interception - CORRECT ANSWER Attacks allows unauthorized users to access our data,
applications, or environments. Are primarily an attack against confidentiality


Interruption - CORRECT ANSWER Attacks cause our assets to become unstable or unavailable
for our use, on a temporary or permanent basis. This attack affects availability but can also attack
integrity


Modification - CORRECT ANSWER Attacks involve tampering with our asset. Such attacks
might primarily be considered an integrity attack, but could also be an availability attack.


Fabrication - CORRECT ANSWER Attacks involve generating data, processes,
communications, or other similar activities with a system. Attacks primarily affect integrity but
can be considered an availability attack.


Risk - CORRECT ANSWER The likelihood that a threat will occur. There must be a threat and
vulnerability


Threat - CORRECT ANSWER Any event being man-made, natural or environmental that could
damage the assets


Vulnerabilities - CORRECT ANSWER Weakness that a threat event or the threat can take
advantage of


Impact - CORRECT ANSWER taking into account the assets cost


Controls - CORRECT ANSWER The ways we protect assets. Physical, technical/ logical, and
administrative

,Physical controls - CORRECT ANSWER Controls are physical items that protect assets. Think
of locks, doors, guards and fences


Technical/ logical controls - CORRECT ANSWER Controls are devices and software that
protect assets. Think of firewalls, av, ids, and ips


Administrative controls - CORRECT ANSWER Controls are the policies that organizations
create for governance. Ex: email policies


risk mamagement - CORRECT ANSWER A constant process as assets are purchased, used and
retired. The general steps are 1- identify assets
2- identify threats
3- assess vulnerabilities
4- assess risk
5- mitigating risks


Identify assets - CORRECT ANSWER First and most important part or risk management.
Identifying and categorizing the assets we are protecting


Identify threats - CORRECT ANSWER Once we have our critical assets we can identify the
threats that might effect them


Assess Vulnerabilities - CORRECT ANSWER Look at potential threats. any given asset may
have thousand or millions of threats that could impact it, but only a small fraction of the threats
will be relevant


Assess risks - CORRECT ANSWER Once we have identified the threats and vulnerabilities for a
given asset we can access the overall risk


Mitigating risks - CORRECT ANSWER Putting measures in place to help ensure that a given
type of threat is accounted for

,Incident response - CORRECT ANSWER Response to when risk management practices have
failed and have cause an inconvenience to a disastrous event


Incident response cycle - CORRECT ANSWER 1 preparation
2- detection and analysis
3- containment
4- eradication
5- recovery
6- post incident activity


Preparation phase - CORRECT ANSWER The preparation phase consists of all of the activities
that we can preform in advance of the incident itself in order to better enable us to handle it


Detection and analysis phase - CORRECT ANSWER Where the action begins to happen. We
will detect the occurrence of an issue and decide whether or not it is actually an incident so that
we can respond


Containment phase - CORRECT ANSWER Taking steps to ensure that the situation does not
cause any more damage than it already has, or to at least lessen any ongoing harm.


Eradication phase - CORRECT ANSWER We will attempt to remove the effects of the issue
from our environment


Recovery phase - CORRECT ANSWER Recover to a better state that we were prior to the
incident or perhaps prior to when the issue started if we did not detect it immediately


Post incident activity phase - CORRECT ANSWER We attempt to determine specifically what
happened, why it happened, and what we can do to keep it from happening again.
Defense in depth - CORRECT ANSWER Layering of security controls is more effective and
secure than relying on a single control

, Identity - CORRECT ANSWER Who or what we claim to be ( username)


Authentication CORRECT ANSWER The act of proving who or what we claim to be (password)


Identity verification - CORRECT ANSWER -
The half step between identity and authentication (showing two forms of Id)


single-factor authentication - CORRECT ANSWER Involves the use of simply one of the three
available factors solely in order to carry out the authentication process being requested


Dual-factor authentication - CORRECT ANSWER An authentication method that includes
multiple methods for a single authentication transaction. Often referred to as "something you
have and something you know," when the factors include a device such as a smart card and a
secret such as a password or PIN.


Multi-factor authentication - CORRECT ANSWER Use of several authentication techniques
together, such as passwords and security tokens.


mutual authentication - CORRECT ANSWER The process where the session is authenticated on
both ends and just one end . Prevents man in the middle attacks


man-in-the-middle attack - CORRECT ANSWER a hacker placing himself between a client and
a host to intercept communications between them


brute force attack - CORRECT ANSWER the password cracker tries every possible combination
of characters to guess the password


Password manager - CORRECT ANSWER Programs that store all of the users passwords with a
master password

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur DrMedinaReed. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour $24.49. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

78998 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
$24.49
  • (0)
  Ajouter