100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
D430: Fundamentals of Information Security Study Guide QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+ 2025/2026$12.99
Add to cart
D430: Fundamentals of Information
Security Study Guide
1. Access Control - ANS-permitting, denying, proscribing, revoking
2. Access manipulate listing - ANS-data approximately that type of access certain parties
are permits to must a given machine
3. Access manipulate fashions - ANS-- Discretionary Access Control (DAC): proprietor of
sources determines who receives get entry to and what stage
4. - Mandatory Access Control (MAC): separate organization or man or woman (from
owner) has the authority to set get entry to to assets
5. - Rule-primarily based Access Control: lets in get admission to in step with a set of rules
described via the device administrator
6. - Role-Based Access Control (RBAC): features get right of entry to controls set by way of
an authority responsible for doing so, in preference to by way of the owner of the useful
resource
7. - Attribute-Based Access Control (ABAC): based totally on attributes, such as of
someone, aid, or an environment
8. Asymmetric Cryptography - ANS-a public key and a private key. The public key's used to
encrypt facts despatched from the sender to the receiver and is shared with all people.
Private keys are used to decrypt information that arrives at the receiving end and are
very cautiously guarded with the aid of the receiver (aka the public key cryptography)
9. Asymmetric Key Algorithms - ANS-- comfortable sockets layer (SSL): secure
transactions like internet and e-mail site visitors
10. - elliptic curve cryptography (ECC): can cozy all browser connections to the internet
servers
11. - quite suitable privateness (PGP): securing messages and documents
12. - shipping layer security (TLS)
13. Attack Types (4) - ANS-interception, interruption, modification, fabrication
14. Auditiing - ANS-the examination and evaluation of an agency's records to ensure
accountability through technical approach
15. Authentication - ANS-verifying that a person is who they declare to be
16. Authenticity - ANS-permits us to talk about the proper attribution as to the proprietor or
author of the statistics in question
17. Authorization - ANS-what the consumer can get entry to, modify, and delete
18. Availability - ANS-the potential for those legal to access facts when wanted
19. BinScope Binary Analyzer - ANS-A tool developed by Microsoft to take a look at source
code for preferred precise practices
20. Block Cipher - ANS-takes a predetermined number of bits, called a block, within the
plaintext message and encrypts that block
, 21. Brute force - ANS-an attack by means of filing password tries till eventually guessed
efficiently
22. Buffer overflows - ANS-a vulnerability that takes place while we do no longer well keep
the scale of the statistics input into our packages, inflicting this system to crash and an
attacker to take benefit
23. Certificates - ANS-hyperlink a public key to a selected character and are frequently used
as a form of electronic identification for that unique man or woman
24. Children's Online Privacy Protection Act (COPPA) - ANS-sets policies on information
collection for kids underneath 13 to protect their on-line privacy
25. CIA Triad - ANS-Confidentiality, Integrity, Availability
26. Compliance - ANS-conforming to a rule, inclusive of specification, policy, popular or
regulation
27. Confidential - ANS-permitting simplest the ones legal to get entry to the statistics
requested
28. Cross-Site Scripting (XSS) - ANS-An assault performed through setting code inside the
shape of a scripting language right into a Web web page, or different media, that is
interpreted by means of a client browser, which includes Adobe Flash animation and
some styles of video files
29. Cryptography - ANS-the practice of retaining facts cozy via using codes and ciphers
30. DDOS - ANS-a type of cyber attack in which an attacker floods a website or community
with a lot site visitors that it will become unavailable to valid users
31. Deep packet inspection - ANS-Analyzing the real content of the site visitors this is
flowing via them
32. Defense in-depth - ANS-the use of a variety of security measures in order to
nevertheless acquire a successful protection ought to one or more of the protecting
measures fail
33. Digital signatures - ANS-make certain that the message turned into legitimately
despatched with the aid of the expected birthday party, and to prevent the sender from
denying that she or he sent the message, known as nonrepudiation
34. DMZ (demilitarized sector) - ANS-a layer of protection that separates a device from the
relaxation of a community and used to host public facing offerings consisting of web sites
35. Fabrication - ANS-assaults that create false statistics (affects integrity & availibility)
36. Factors of authentication - ANS-Something you understand, some thing you've got, and
some thing you're, somewhere you're, and some thing you do
37. Family Educational Rights and Privacy Act (FERPA) - ANS-protects the privacy of
college students and their mother and father, regulating educational records, together
with academic statistics, personally identifiable data, and directory records
38. Federal Information Security Management Act (FISMA) - ANS-protects the records,
operations, and belongings in the federal authorities
39. Firewalls - ANS-controls get right of entry to to a community and the site visitors that
flows into and out of our networks, certainly developing community segmentation whilst
set up
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Ashley96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.