100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL FINAL EXAM|LATEST UPDATE |BRAND NEW VERIFIED EXAM QUESTIONS AND CORRECT ANSWERS ALL GRADED A+|GUARANTEED SUCCESS $13.49   Add to cart

Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL FINAL EXAM|LATEST UPDATE |BRAND NEW VERIFIED EXAM QUESTIONS AND CORRECT ANSWERS ALL GRADED A+|GUARANTEED SUCCESS

 6 views  0 purchase
  • Course
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • Institution
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY ACTUAL FINAL EXAM|LATEST UPDATE |BRAND NEW VERIFIED EXAM QUESTIONS AND CORRECT ANSWERS ALL GRADED A+|GUARANTEED SUCCESS explain PCI DCS - ANSWER-An information security standard used to handle credit card payments. explain HIPAA - ANSWE...

[Show more]

Preview 4 out of 50  pages

  • October 9, 2024
  • 50
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
  • WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
avatar-seller
BRILLIANTSOLUTIONS
WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY ACTUAL
FINAL EXAM|LATEST UPDATE 2024-
2025|BRAND NEW VERIFIED EXAM
QUESTIONS AND CORRECT ANSWERS
ALL GRADED A+|GUARANTEED
SUCCESS



explain PCI DCS - ANSWER-✅An information security standard used to handle credit
card payments.

explain HIPAA - ANSWER-✅For organizations that set a standard to protect sensitive
healthcare and patient records

explain FISMA (Federal Information Security Management Act) - ANSWER-✅Defines
security standards for many federal agencies in the U.S.

Mandates government agencies to protect information systems.

regulates federal departments in the United States.

Describe CIA triad - ANSWER-✅Confidentiality, Integrity, Availability- A Security
concept in infosec.

Confidentiality - ANSWER-✅Our ability to protect our data from those who are not
authorized to view it.

Integrity - ANSWER-✅The ability to prevent people from changing your data in an
unauthorized or desirable manner.

Availability - ANSWER-✅The ability to access our data when we need it.

Describe Parkerian Hexad - ANSWER-✅Possession/control, Authenticity, and Utility,
Confidentiality, Integrity, Availability.

,Possession/Control - ANSWER-✅The physical disposition of the media on which the
data is stored

Authenticity - ANSWER-✅Allows you to say whether you've attributed the data in
question to the proper owner or creator.

Utility - ANSWER-✅How useful the data is to you.

Types of attacks in CIA categories - ANSWER-✅C-Interception

I- Interruption, Modification, Fabrication

A-Interruption, Modification, Fabrication

Types of control - ANSWER-✅Physical, Logical/Technical, and Administrative control

physical control example - ANSWER-✅fences, gates, locks, guard

Logical/Technical control example - ANSWER-✅passwords, encryption, firewalls,
access controls, IDS

Administrative control example - ANSWER-✅rules, laws, policies, procedures,
guidelines

Incident Response process - ANSWER-✅Preparation, Detection and analysis,
Containment, Eradication, Recover, Post-incident activity.

What is Defense in depth - ANSWER-✅multilayered defense

What is a "Sandbox" - ANSWER-✅An isolated environment that protects a set of
resources

What is FTP (File Transfer Protocol) used for? - ANSWER-✅Used to transfer files

How ports does FTP use - ANSWER-✅port 20 & 21

What is IMAP (Internet Message Access Protocol) used for? - ANSWER-✅managing
email.

what port does IMAP use - ANSWER-✅port 143

What is SSH (Secure Shell) used for? - ANSWER-✅To manage remote connections to
systems

What port does SSH use? - ANSWER-✅port 22

, What is a clickjacking attack? - ANSWER-✅A client side attack where a user can be
tricked into clicking on something without realizing that they did

For Clickjacking, the attacker must take control of ________ or a portion of
________ to place an invisible layer over something the client would normally click
on. - ANSWER-✅The website, the website

Give an example of a CSRF (Cross-site request forgery) attack - ANSWER-✅An
attacker embedding a link on a webpage or email, executing additional commands
the attacker embedded.

Describe DAC (DISCRECTIONary access control) - ANSWER-✅The owner of the
resource determines who gets access to it and to what levels. (Under owners
discretion)

what are the 6 main access control modes. - ANSWER-✅Role-based access control,
Rule-based access control (RBAC), Discretionary access control (DAC), Mandatory
access control (MAC), and Attribute-based control (ABAC),
Multilevel Access Control

What are Access Control Models - ANSWER-✅A way of determining who should b
allowed access to what resources.

What is rule-based access control? - ANSWER-✅Allows access according to a set of
rules defined by the system administrator

what is Role based Access Control (RBAC) - ANSWER-✅allows access based on the
role.

example of Role-Based Access Control - ANSWER-✅employee having access only to
complete a certain task.

what is Attribute-Based Access Control (ABAC)? - ANSWER-✅Access based on
specific attributes of a person, resource, or environment. (ex: CAPTCHA)

examples of (RBAC) attributes - ANSWER-✅Subject attribute: "You must be this tall
to ride this ride";

Resource attribute: CAPTCHA

Environmental attributes: Business Hours, VPN time limits

example of Mandatory access control - ANSWER-✅Secret or Top secret clearance.

explain Multilevel Access Control - ANSWER-✅Access control combined across
other models.

, How is deterrence achieved? - ANSWER-✅by discouraging an action or event
though fear of being caught

example of Deterrence - ANSWER-✅clock in time cards, Badge ins to avoid stealing
work time.

Explain Nonrepudiation - ANSWER-✅not being able to deny an action due to
evidence that an act has taken place.

Example of Nonrepudiation - ANSWER-✅read receipts, digital signatures of
documents.

What does a substitution cipher do? - ANSWER-✅substitutes letters of the alphabet
with a different one.

describe Casear cipher - ANSWER-✅shifting each letter of the message by a certain
number of spaces.

how many spaces does a ROT13 cipher move letters - ANSWER-✅13

Symmetric Cryptography is also known as - ANSWER-✅Private Key cryptography

describe symmetric cryptography - ANSWER-✅1. single key use
2. encrypts plaintext and decrypt ciphertext
3.Weakness is key exchange

describe key exchange - ANSWER-✅Sharing the key between the sender and
receiver

Describe Block cipher - ANSWER-✅type of symmertric cryptography that takes
binary digits or blocks and encrypts it.

describe stream cipher - ANSWER-✅type of symmetric cryptography that encrypts
each bit in the plain text one bit at a time.

Block vs stream ciphers - ANSWER-✅1. block encrypts a block at a time, stream
cipher encrypts one bit at a time
2.Block is currenlty used
3. block is faster.
4. Block is better used for know file sizes, cipher is better for unknown data size or
continuous stream

most used cryptographic algorithm? - ANSWER-✅symmetric key algorithm

example of symmetric key algorithm - ANSWER-✅DES, 3DES, AES

How may bits used in a DES block cipher key - ANSWER-✅56 bits

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BRILLIANTSOLUTIONS. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80461 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart