WGU D430 Fundamentals of Information Security MULTI/COMPREHENSIVE FINAL EXAM REVIEW

5.0(1)
studied byStudied by 103 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/172

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

173 Terms

1
New cards

The Fabrication attack type most commonly affects which principle(s) of the CIA triad?

A. Availability

B. Integrity

C. Confidentiality

D. Integrity and Availability

E. Confidentiality and Integrity

Integrity and Availability

2
New cards

The Interception attack type most commonly affects which principle(s) of the CIA triad? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Integrity and Availability

B.Confidentiality and Integrity

C.Availability

D.Integrity

E.Confidentiality

Confidentiality

3
New cards

Something that has the potential to cause harm to our assets is known as a(n) ________.

A.Threat

B.Impact

C.Risk

D.Vulnerability

Threat

4
New cards

Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______.

A.Logical controls

B.Administrative controls

C.Physical controls

Logical Control

5
New cards

What is the first and arguably one of the most important steps of the risk management process?

A.Assess risks

B.Mitigate risks

C.Identify threats

D.Assess vulnerabilities

E.Identify assets

Identify assets

6
New cards

Protects information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction

information security

7
New cards

A type of attack, primarily against confidentiality

Interception

8
New cards

Something that has the potential to cause harm to our assets

Threat

9
New cards

A weakness that can be used to harm us

Vulnerability

10
New cards

The likelihood that something bad will happen

Risk

11
New cards

An attack that involves tampering with our assets

Modification attack

12
New cards

A model that adds three more principles to the CIA triad: possession or control, utility, and authenticity

Parkerian hexad

13
New cards

The physical disposition of the media on which the data is stored

Possession or control

14
New cards

An attack that involves generating data, processes, communications, or other similar activities with a system

Fabrication attack

15
New cards

A multilayered defense that will allow us to achieve a successful defense should one or more of our defensive measures fail

Defense in depth

16
New cards

Sometimes called technical controls, these protect the systems, networks, and environments that process, transmit, and store our data

Logical controls

17
New cards

Controls that protect the physical environment in which our systems sit, or where our data is stored

Physical controls

18
New cards

The risk management phase that consists of all of the activities that we can perform in advance of the incident itself, in order to better enable us to handle it

Preparation phase

19
New cards

The risk management phase where we detect the occurrence of an issue and decide whether it is actually an incident so that we can respond to it appropriately

Detection and analysis phase

20
New cards

The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________.

A. Collectability

B. Acceptability

C.Universality

D.Uniqueness

E.Permanence

E.Permanence

21
New cards

What type of authentication can prevent a man-in-the-middle attack? This task contains the radio buttons and checkboxes for options.

A.Multifactor

B.Mutual

C.Something you know

D.Something you are

ESomething you do

B.Mutual

22
New cards

An authentication mechanism in which both parties authenticate each other

Mutual authentication

23
New cards

Describes the ease with which a system can be tricked by a falsified biometric identifier

Circumvention

24
New cards

A user who creates a network share and sets permissions on that share is employing which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A. Mandatory access control

B. Discretionary access control

C. Attribute-based access control

D. Role-based access control

Discretionary access control

25
New cards

What type of access control can prevent the confused deputy problem? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.ACLs

B.A password policy

C.Capability-based security

D.A locked door

Capability-based security

26
New cards

Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Discretionary access control

B.Role-based access control

C.Attribute-based access control

D.Mandatory access control

D.Mandatory access control

27
New cards

A VPN connection that is set to time out after 24 hours is demonstrating which model of access control? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Mandatory access control

B.Role-based access control

C.Attribute-based access control

D.Discretionary access control

Attribute-based access control

Lesson: Authorization and Access Control

Objective: More Advanced

28
New cards

States that we should allow only the bare minimum access required in order for a given party (person, user account, or process) to perform a needed functionality

Principle of least privilege

29
New cards

Typically built to a certain resource, these contain the identifiers of the party allowed to access the resource and what the party is allowed to do.

Access control lists (ACLs)

30
New cards

In this method of security, a person's capabilities are oriented around the use of a token that controls their access (e.g. a personal badge)

Capability-based security

31
New cards

A type of attack that is more common in systems that use ACLs rather than capabilities

The confused deputy problem

32
New cards

A type of attack that misuses the authority of the browser on the user's computer

Cross-site request forgery (CSRF)

33
New cards

Access is determined by the owner of the resource in question

Discretionary access control (DAC)

34
New cards

Similar to MAC in that access controls are set by an authority responsible for doing so, rather than by the owner of the resource. In this model, access is based on the role the individual is performing

Role-based access control (RBAC)

35
New cards

Access is based on attributes (of a person, a resource, or an environment)

Attribute-based access control

36
New cards

Designed to prevent conflicts of interest; commonly used in industries that handle sensitive data. Three main resource classes are considered in this model: objects, company groups, and conflict classes.

The Brewer and Nash model

37
New cards

A combination of DAC and MAC, primarily concerned with the confidentiality of the resource. Two security properties define how information can flow to and from the resource: the simple security property and the * property.

The Bell-LaPadula model

38
New cards

Primarily concerned with protecting the integrity of data, even at the expense of confidentiality. Two security rules: the simple integrity axiom and the * integrity axiom.

The Biba model

39
New cards

An access control model that includes many tiers of security and is used extensively by military and government organizations and those that handle data of a very sensitive nature

Multilevel access control model

40
New cards

What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Nonrepudiation

B.Deterrence

C.Auditing

D.Accountability

E.Authorization

C.Auditing

Lesson: Auditing and Accountability

Objective: Introduction

41
New cards

Nessus is an example of a(n) _______________ tool. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Fuzzing

B.Anti-virus

C.Anti-malware

D.Vulnerability scanning

E.Penetration testing

D.Vulnerability scanning

42
New cards

A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Deterrence

B.Nonrepudiation

C.Intrusion detection and prevention

D.Authentication

E.Authorization

B.Nonrepudiation

43
New cards

_______ provides us with the means to trace activities in our environment back to their source. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Access

B.Authentication

C.Accountability

D.Authorization

E.Nonrepudiation

C.Accountability

44
New cards

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs? This task contains the radio buttons and checkboxes for options.

A.Elliptic Curve Cryptography (ECC)

B.Digital signatures

C.Advanced Encryption Standard (AES)

D.Blowfish

A.Elliptic Curve Cryptography (ECC)

Lesson: Cryptography

Objective: Alert!

45
New cards

Question 3 : We are somewhat limited in our ability to protect which type of data? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Data at rest

B.Data in motion

C.Data in use

C.Data in use

46
New cards

he science of breaking through encryption is known as _____. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Ciphertext

B.Cryptology

C.Cryptography

D.Cryptanalysis

D.Cryptanalysis

47
New cards

The specifics of the process used to encrypt the plaintext or decrypt the ciphertext

Cryptographic algorithm

48
New cards

Also known as private key cryptography, this uses a single key for both encryption of the plaintext and decryption of the ciphertext

Symmetric key cryptography

Example: AES

49
New cards

A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block

Block cipher

50
New cards

A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time

Stream cipher

51
New cards

A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook (TCB) mode

AES

52
New cards

Also known as public key cryptography, this method uses two keys: a public key and a private key.

Asymmetric key cryptography

53
New cards

Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic

Secure Sockets Layer (SSL) protocol

54
New cards

Also referred to as message digests, these functions do not use a key

Hash functions

55
New cards

Infrastructure that includes the CAs that issue and verify certificates and the registration authorities (RAs) that verify the identity of the individuals associated with the certificates

Public key infrastructure (PKI)

56
New cards

______ regulates the financial practice and governance of corporations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.GLBA

B.FISMA

C.SOX

D.FERPA

E.HIPAA

C.SOX

57
New cards

Regulations mandated by law, usually requiring regular audits and assessments

Regulatory Compliance

58
New cards

This act safeguards privacy through the establishment of procedural and substantive rights in personal data

The Federal Privacy Act of 1974

59
New cards

Question : Risk can be higher when ___________ services are used for computing operations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.auditing

B.competitive intelligence

C.cloud computing

D.OPSEC

C.cloud computing

60
New cards

Laws of OPSEC

1.If you don't know what to protect, how do you know you are protecting it?

2.If you don't know the threat, how do you know what to protect?

3.If you are not protecting it (i.e. the information), THE DRAGON WINS!

1.If you don't know the threat, how do you know what to protect?

2.If you don't know what to protect, how do you know you are protecting it?

3.If you are not protecting it (i.e. the information), THE DRAGON WINS!

61
New cards

During what phase of the operations security process do we match threats and vulnerabilities? T

A.Assessment of risks

B.Analysis of vulnerabilities

C.Analysis of threats

D.Identification of critical information

E.Application of countermeasures

A.Assessment of risks

62
New cards

Haas' second law of operations security, "If you don't know what to protect, how do you know you are protecting it?," maps to what step in the operations security process?

A.Analysis of threats

B.Analysis of vulnerabilities

C.Assessment of risks

D.Application of countermeasures

E.Identification of critical information

E.Identification of critical information

63
New cards

You are leaving for an extended vacation and want to take steps to protect your home. You set a timer to turn lights and the TV on and off at various times throughout the day, suspend the mail delivery, and arrange for a neighbor to come in and water the plants. What step in the operations security process do these actions demonstrate? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A.Identification of critical information

B.Analysis of threats

C.Analysis of vulnerabilities

D.Assessment of risks

E.Application of countermeasures

E.Application of countermeasures

64
New cards

The process of intelligence gathering and analysis to support business decisions is known as _______.

A.Competitive intelligence

B.Competitive business

C.Business intelligence

D.Business competition

E.Counter intelligence

A.Competitive intelligence

65
New cards

The study that was conducted to discover the cause of the information leak during the Vietnam War was codenamed ________ and is now considered a symbol of OPSEC.

A.Sun Tzu

B.Vietnam Viper

C.The Art of War

D.Purple Dragon

D.Purple Dragon

66
New cards

The process of intelligence gathering and analysis in order to support business decisions

Competitive intelligence

67
New cards

Name the five steps of the operations security process

1.Identification of critical information

2.Analysis of threats

3.Analysis of vulnerabilities

4.Assessment of risks

5.Application of countermeasures

1.Identification of critical information

2.Analysis of threats

3.Analysis of vulnerabilities

4.Assessment of risks

5.Application of countermeasures

68
New cards

Haas' Laws of Operations Security: The First Law

If you don't know the threat, how do you know what to protect?

69
New cards

Haas' Laws of Operations Security: The Second Law

If you don't know what to protect, how do you know you are protecting it?

70
New cards

Haas' Laws of Operations Security: The Third Law

If you are not protecting it, the dragon wins!

71
New cards

The first step in the OPSEC process, and arguably the most important: to identify the assets that most need protection and will cause us the most harm if exposed

Identification of critical information

72
New cards

The second step in the OPSEC process: to look at the potential harm or financial impact that might be caused by critical information being exposed, and who might exploit that exposure

Analysis of threats

73
New cards

The third step in the OPSEC process: to look at the weaknesses that can be used to harm us

Analysis of vulnerabilities

74
New cards

The fourth step in the OPSEC process: to determine what issues we really need to be concerned about (areas with matching threats and vulnerabilities)

Assessment of risks

75
New cards

The fifth step in the OPSEC process: to put measures in place to mitigate risks

Application of countermeasures

76
New cards

Name the most common security awareness issues

Protecting data, passwords, social engineering, network usage, malware, the use of personal equipment, clean desk, policy knowledge

Name the most common security awareness issues

Protecting data, passwords, social engineering, network usage, malware, the use of personal equipment, clean desk, policy knowledge

77
New cards

A technique used by an attacker that relies on the willingness of people to help others

Social engineering

78
New cards

A technique involving a fake identity and a believable scenario that elicits the target to give out sensitive information or perform some action which they would not normally do for a stranger

Pretexting

79
New cards

A social engineering technique that uses electronic communications (email, texts, or phone calls) to convince a potential victim to give out sensitive information or perform some action

Phishing

80
New cards

A social engineering technique that targets a specific company, organization, or person, and involves knowing specifics about the target to appear valid

Spear phishing

81
New cards

A program that seeks to make users aware of the risk they are accepting through their current actions and attempts to change their behavior through targeted efforts

Security Awareness, Training, and Education (SATE)

82
New cards

What planning process ensures that critical business functions can continue to operate during an emergency?

A.Incident response planning

B.Risk management planning

C.Operations security planning

D.Disaster recovery planning

E.Business continuity planning

E.Business continuity planning

83
New cards

What planning process ensures that we can respond appropriately during and after a disaster?

A.Incident response planning

B.Risk management process

C.Operations security process

D.Disaster recovery planning

E.Business continuity planning

D.Disaster recovery planning

84
New cards

Your company has an office full of expensive computer equipment to protect. You recommend a variety of approaches, including a security guard stationed at the entrance, a high fence around the property, and key card entry to all nonpublic areas. What security concept are you recommending to protect your company's assets?

A.Defense in depth

B.Nonrepudiation

C.Capability-based security

D.Access control lists

E.Principle of least privilege

A.Defense in depth

85
New cards

Which of the options below demonstrates all three types of physical security controls: deterrent, detective, and preventive?

A.A burglar alarm

B.A guard dog

C.A locked door

D.A warning sign

E.An employee policy

B.A guard dog

86
New cards

Name three main types of physical controls

Deterrent, detective, and preventive

Deterrent, detective, and preventive

87
New cards

Hping3: A tool used to test the security of firewalls.

Hping3: A tool used to test the security of firewalls.

88
New cards

Kismet: A tool used to detect unauthorized wireless access points.

Kismet: A tool used to detect unauthorized wireless access points.

89
New cards

Nmap: A versatile tool able to scan ports, search for hosts on the network, and other operations.

Nmap: A versatile tool able to scan ports, search for hosts on the network, and other operations.

90
New cards

Tcpdump: This command-line packet sniffing tool runs on Linux and UNIX operating systems.

Tcpdump: This command-line packet sniffing tool runs on Linux and UNIX operating systems.

91
New cards

Wireshark: A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.

Wireshark: A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic.

92
New cards

_____________ is a sniffer that specializes in detecting wireless devices.

A.Hping3

B.Kismet

C.Wireshark

D.NetStumbler

B.Kismet

93
New cards

A tool that deliberately displays vulnerabilities in an attempt to bait attackers is called _____________.

A.A vulnerability assessment scanner

B.A honeypot

C.A fuzzer

D.A sniffer

E.A port scanner

B.A honeypot

94
New cards

A firewall that can watch packets and monitor the traffic from a given connection is using what kind of firewall technology?

A.Deep packet inspection

B.Stateful packet inspection

C.Packet filtering

B.Stateful packet inspection

95
New cards

_____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources.

A.Wireshark

B.Kismet

C.Hping3

D.NetStumbler

A.Wireshark

96
New cards

A specialized type of firewall that provides security and performance features, functions as a choke point, allows for logging traffic for later inspection, and serves as a single source of requests for the devices behind it is known as a(n) ____________

A.Proxy server

B.FTP server

C.Packet sniffer

D.Web server

E.Intrusion detection system

A.Proxy server

97
New cards

This method of security involves a well-configured and patched network, and incorporating elements such as network segmentation, choke points, and redundancy

Security in network design

98
New cards

The act of dividing a network into multiple smaller networks, each acting as its own small network (subnet)

Network segmentation

99
New cards

Certain points in the network, such as routers, firewalls, or proxies, where we can inspect, filter, and control network traffic

Choke points

100
New cards

A firewall technology that inspects the contents of each packet in network traffic individually and makes a gross determination (based on source and destination IP address, port number, and the protocol being used) of whether the traffic should be allowed to pass

Packet filtering