100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT (2024/2025) TEST BANK ACTUAL EXAM 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED BY EXPERT) |ALREADY GRADED A+ <LATEST VERSION>$12.99
Add to cart
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT (2024/2025) TEST BANK ACTUAL EXAM 500 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED BY EXPERT) |ALREADY GRADED A+ <LATEST VERSION>
6 views 0 purchase
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM
OBJECTIVE ASSESSMENT (2024/2025)
TEST BANK ACTUAL EXAM 500
QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED BY EXPERT)
|ALREADY GRADED A+
<LATEST VERSION>
5 steps of the operations security process - ANSWER 1.Identification of cr...
WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM
OBJECTIVE ASSESSMENT (2024/2025)
TEST BANK ACTUAL EXAM 500
QUESTIONS AND CORRECT DETAILED
ANSWERS (VERIFIED BY EXPERT)
|ALREADY GRADED A+
<LATEST VERSION>
5 steps of the operations security process - ANSWER ✔ 1.Identification of critical
information
2.Analysis of threats
3.Analysis of vulnerabilities
4.Assessment of risks
5.Application of countermeasures
If you don't know the threat, how do you know what to protect? - ANSWER ✔
The 1st Law of Haas' Laws of Operations Security
If you don't know what to protect, how do you know you are protecting it? -
ANSWER ✔ The 2nd Law of Haas' Laws of Operations Security
If you are not protecting it, the dragon wins! - ANSWER ✔ The 3rd Law of Haas'
Laws of Operations Security
, cloud computing - ANSWER ✔ services that are hosted, often over the Internet,
for the purposes of delivering easily scaled computing services or resources
identification of critical information - ANSWER ✔ 1st step in the OPSEC process,
arguably the most important: to identify the assets that most need protection and
will cause us the most harm if exposed
analysis of threats - ANSWER ✔ 2nd step in the OPSEC process: to look at the
potential harm or financial impact that might be caused by critical information
being exposed, and who might exploit that exposure
analysis of vulnerabilities - ANSWER ✔ 3rd step in the OPSEC process: to look
at the weaknesses that can be used to harm us
assessment of risks - ANSWER ✔ 4th step in the OPSEC process: to determine
what issues we really need to be concerned about (areas with matching threats and
vulnerabilities)
Hash functions - ANSWER ✔ mathematical algorithms that generate a message
summary or digest (sometimes called a fingerprint) to confirm message identity
and integrity
digital signature - ANSWER ✔ a means of electronically signing a document with
data that cannot be forged
Digital certificate - ANSWER ✔ Link a public key to an individual
Protecting data at rest - ANSWER ✔ use encryption and physical security
Protecting data in motion - ANSWER ✔ use encryption, protect the connection
with a VPN,
Protecting data in use - ANSWER ✔ We are somewhat limited in our ability to
protect data while it is being used by those who legitimately have access to it.
Authorized users can print files, move them to other machines or storage devices,
etc.
,Which term is synonymous with symmetric cryptography? - ANSWER ✔ Secret
key cryptography
Which term is synonymous with asymmetric cryptography? - ANSWER ✔ Public
key cryptography
regulatory compliance - ANSWER ✔ Regulations mandated by law usually
requiring regular audits and assessments
industry compliance - ANSWER ✔ Regulations or standards designed for specific
industries that may impact ability to conduct business (e.g. PCI DSS)
privacy - ANSWER ✔ the right of people not to reveal information about
themselves
GLBA - ANSWER ✔ "Graham-Leach-Bliley Act" (Financial Services
Modernization Act of 1999) repealed a 1933 law that barred the consolidation of
financial institutions and insurance companies. Included within GLBA are multiple
sections relating to the privacy of financial information. Companies must provide
written notice to consumers of their privacy rights and explain the company's
procedures for safeguarding data.
Privacy guidelines - ANSWER ✔ Guidelines to follow to protect private
information of patients
FISMA - ANSWER ✔ federal info security management act - US law requires
federal agencies to create, document and implement security program
HIPPA - ANSWER ✔ Health Insurance Portability and Accountability Act.
Protects patient privacy.
FERPA - ANSWER ✔ Family Educational Rights and Privacy Act
SOX - ANSWER ✔ Sarbanes-Oxley Act. This law requires publicly traded
companies and their independent auditors to demonstrate that their numbers are
accurate and that they have processes in place to ensure accurate reporting. Several
sections of the law have important implications for human resource activities.
, Industry compliance vs. Regulatory compliance - ANSWER ✔ Industry
compliance isn't enforced by the government, like regulatory compliance. It's a
group of stakeholders in the industry that get together and decide what compliance
looks like.
COPPA - ANSWER ✔ Children's Online Privacy Protection Act
ECC - ANSWER ✔ Asymmetric Key Algorithm, provides encryption, digital
signatures, key exchange, based on the idea of using points on a curve to define the
public/private key, used in wireless devices and smart cards
RSA - ANSWER ✔ asymmetric algorithm
SHA - ANSWER ✔ hashing algorithm
DES - ANSWER ✔ block cipher symmetric algorithm
MD5 - ANSWER ✔ Message Digest 5. A hashing function used to provide
integrity.
PGP - ANSWER ✔ Pretty Good Privacy. Commonly used to secure e-mail
communications between two private individuals but is also used in companies. It
provides confidentiality, integrity, authentication, and non-repudiation. It can
digitally sign and encrypt e-mail. It uses both asymmetric and symmetric
encryption.
Operations Security Process - ANSWER ✔ 1. Identification of critical information
2. Analysis of threats
3. Analysis of vulnerabilities
4. Assessment of risks
5. Application of countermeasures
Operations Security - ANSWER ✔ A security and risk management process that
prevents sensitive information from getting in the wrong hands.
Competitive intelligence - ANSWER ✔ the process of gathering and analyzing
information to support business decisions
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ProfBenjamin. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.