WGU D430 EXAM PREP/COMPREHENSIVE GUIDE 2026 | ALL QUESTIONS AND CORRECT ANSWERS | NEWEST EXAM | GRADED A+ | VERIFIED ANSWERS | WESTERN GOVERNORS UNIVERSITY

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/94

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:20 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

95 Terms

1
New cards

Define the confidentiality in the CIA triad.

Our ability to protect data from those who are not authorized to view it.

2
New cards

Examples of confidentiality

A patron using an ATM card wants to keep their PIN number confidential.

An ATM owner wants to keep bank account numbers confidential.

3
New cards

How can confidentiality be broken?

Losing a laptop

An attacker gets access to info

A person can look over your shoulder

4
New cards

Define integrity in the CIA triad.

The ability to prevent people from changing your data and the ability to reverse unwanted changes.

5
New cards

How do you control integrity?

Permissions restrict what users can do (read, write, etc.)

6
New cards

Examples of integrity

Data used by a doctor to make medical decisions needs to be correct or the patient can die.

7
New cards

Define the availability in the CIA triad.

Our data needs to be accessible when we need it.

8
New cards

How can availability be broken?

Loss of power, application problems. If caused by an attacker, this is a Denial of Service attack.

9
New cards

Define information security.

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

10
New cards

Define the Parkerian Hexad and its principles.

The Parkerian Hexad includes confidentiality, integrity, and availability from the CIA triad. It also includes possession (or control), authenticity, and utility.

<p>The Parkerian Hexad includes confidentiality, integrity, and availability from the CIA triad. It also includes possession (or control), authenticity, and utility.</p>
11
New cards

Authenticity

Whether the data in question comes from who or where it says it comes from (i.e. did this person actually send this email?)

12
New cards

Confidentiality is affected by what type of attack?

Interception (eaves dropping)

13
New cards

Integrity is affected by what type of attacks?

Interruption (assets are unusable), modification (tampering with an asset), fabrication (generating false data)

14
New cards

Authenticity is affected by what type of attacks?

Interruption (assets are unusable), modification (tampering with an asset), fabrication (generating false data)

15
New cards

Utility

How useful the data is to you (can be a spectrum, not just yes or no)

16
New cards

Possession

Do you physically have the data in question? Used to describe the scope of a loss

17
New cards

Identify the four types of attacks

interception, interruption, modification, and fabrication

18
New cards

Interception attacks

Make your assets unusable or unavailable

19
New cards

Interruption attacks

cause assets to become unusable or unavailable for our use, on a temporary or permanent basis

20
New cards

Modification attacks

Tampering with an asset

21
New cards

Fabrication attacks

Generating data, process, and communications

22
New cards

Define the risk management process

1. Identify assets

2. Identify threats

3. Assess vulnerabilities

4. Assess risks

5. Mitigate risks

23
New cards

Define the incident response process and its stages.

Preparation

Detection and analysis

Containment

Eradication

Recovery

24
New cards

Preparation in incident response

creating policies and procedures

25
New cards

Detection in incident response

Using tools and humans to decide if an incident is an incident

26
New cards

Defense in Depth

employing multiple layers of controls to avoid a single point of failure

<p>employing multiple layers of controls to avoid a single point of failure</p>
27
New cards

Identify types of controls to mitigate risk

physical, logical, administrative

28
New cards

Identify elements of risk management in policies and procedures.

Development of robust policies

Identification of emergent recent

Identify elements of internal weakness

29
New cards

Identify the layers of a defense-in-depth strategy.

External network

Internal network

Host

Application

Data

30
New cards

Define identification

The claim of who we/networks are

31
New cards

Define identity verification.

Someone claims who they are and you take it one step father and ask for ID

32
New cards

Define authentication

A set of methods used to determine if a claim of identity is true.

33
New cards

Compare authentication types.

Multifactor authentication

Mutual authentication

34
New cards

Identify password security best practices.

Upper case

Lower case

Numbers

Symbols

35
New cards

Identify the factors involved in a multifactor authentication technique.

Something you do

Something you have

Where you are

36
New cards

Define accountability and its benefits

nonrepudiation, deterrence, intrusion detection and prevention, and admissibility of records

37
New cards

Auditing

Hold users of your system accountable. A methodical examination and review of an organization's records.

38
New cards

nonrepudiation measures

make it so that someone can't send an email and then deny sending it. usually with a digital signature.

39
New cards

Which standards apply to any financial entity policies?

Gramm-Leech-Bliley

40
New cards

Which standards apply to publicly traded companies doing business in the U.S?

Sarbanes-Oxley Act (SOX)

41
New cards

Which standards apply to credit card industry?

PCI DSS

42
New cards

Which characteristic falls under accountability?

Identity

43
New cards

What company audits other companies for licensing requirements?

BSA

44
New cards

Define cryptography, including its origins and influencers.

The science of protecting the confidentiality and integrity of data

45
New cards

symmetric key cryptography

the sender and receiver use the same key for encryption and decryption

46
New cards

Asymmetric Key Cryptography

Encryption that uses two separate keys- a public key and a private key. Advantage is that you can post the public key and anyone can send you an encrypted message.

47
New cards

Hash functions

mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity

48
New cards

digital signature

a means of electronically signing a document with data that cannot be forged

49
New cards

Digital certificate

Link a public key to an individual

50
New cards

Protecting data at rest

use encryption and physical security

51
New cards

Protecting data in motion

use encryption, protect the connection with a VPN,

52
New cards

Protecting data in use

We are somewhat limited in our ability to protect data while it is being used by those who legitimately have access to it. Authorized users can print files, move them to other machines or storage devices, etc.

53
New cards

Rivest-Shamir-Adleman

encryption algorithm

54
New cards

Which term is synonymous with symmetric cryptography?

Secret key cryptography

55
New cards

Which term is synonymous with asymmetric cryptography?

Public key cryptography

56
New cards

regulatory compliance

Regulations mandated by law usually requiring regular audits and assessments

57
New cards

industry compliance

Regulations or standards designed for specific industries that may impact ability to conduct business (e.g. PCI DSS)

58
New cards

privacy

the right of people not to reveal information about themselves

59
New cards

GLBA

"Graham-Leach-Bliley Act" (Financial Services Modernization Act of 1999) repealed a 1933 law that barred the consolidation of financial institutions and insurance companies. Included within GLBA are multiple sections relating to the privacy of financial information. Companies must provide written notice to consumers of their privacy rights and explain the company's procedures for safeguarding data.

60
New cards

Privacy guidelines

Guidelines to follow to protect private information of patients

61
New cards

FISMA

federal info security management act - US law requires federal agencies to create, document and implement security program

62
New cards

HIPPA

Health Insurance Portability and Accountability Act. Protects patient privacy.

63
New cards

FERPA

Family Educational Rights and Privacy Act

64
New cards

SOX

Sarbanes-Oxley Act. This law requires publicly traded companies and their independent auditors to demonstrate that their numbers are accurate and that they have processes in place to ensure accurate reporting. Several sections of the law have important implications for human resource activities.

65
New cards

Industry compliance vs. Regulatory compliance

Industry compliance isn't enforced by the government, like regulatory compliance. It's a group of stakeholders in the industry that get together and decide what compliance looks like.

66
New cards

COPPA

Children's Online Privacy Protection Act

67
New cards

ECC

Asymmetric Key Algorithm, provides encryption, digital signatures, key exchange, based on the idea of using points on a curve to define the public/private key, used in wireless devices and smart cards

68
New cards

RSA

asymmetric algorithm

69
New cards

SHA

hashing algorithm

70
New cards

DES

block cipher symmetric algorithm

71
New cards

MD5

Message Digest 5. A hashing function used to provide integrity.

72
New cards

PGP

Pretty Good Privacy. Commonly used to secure e-mail communications between two private individuals but is also used in companies. It provides confidentiality, integrity, authentication, and non-repudiation. It can digitally sign and encrypt e-mail. It uses both asymmetric and symmetric encryption.

73
New cards

Operations Security Process

1. Identification of critical information

2. Analysis of threats

3. Analysis of vulnerabilities

4. Assessment of risks

5. Application of countermeasures

74
New cards

Operations Security

A security and risk management process that prevents sensitive information from getting in the wrong hands.

75
New cards

Competitive intelligence

the process of gathering and analyzing information to support business decisions

76
New cards

Haase's Laws: Know the threats

If you don't know the threat, how do you know what to protect? Know the threats for your data based on your location.

77
New cards

Haase's Laws: Know what to protect

If you don't know what to protect, how do you know you're protecting it? Some orgs classify information (top secret).

78
New cards

Hasse's Laws: Protect the information

If you don't protect the information, your adversaries win.

79
New cards

Human Element Security

Security Awareness, Training, and Education (SATE)

80
New cards

Pretexting

a form of social engineering in which one individual lies to obtain confidential data about another individual

81
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

82
New cards

competitive intelligence

the process of intelligence gathering and analysis to support business decisions

83
New cards

Competitive Counterintelligence

the practice of managing the range of intelligence-gathering activities directed at an organization

84
New cards

Network-based IDS (NIDS)

an independent platform that monitors network traffic to identify intruders.

85
New cards

host-based IDS

are used to analyze the activities on or directed at the network interface of a particular asset (host).

86
New cards

Wireshark

a sniffer that is capable of intercepting and troubleshooting traffic from both wired and wireless sources.

87
New cards

Nmap

A network utility designed to scan a network and create a map. Frequently used as a vulnerability scanner.

88
New cards

Which port service needs to be removed when running a webserver?

53

89
New cards

Port 80

provides Hypertext Transfer Protocol (HTTP) services, which serves Web content.

90
New cards

AES

AES is the standard encryption algorithm used by the US Federal government.

91
New cards

SSRF

(Server-Side Request Forgery) An attack that takes advantage of a trusting relationship between web servers. Attacker finds vulnerable web application, sends request to web server, web server performs request on behalf of attacker.

92
New cards

kismet

Kismet is a tool commonly used to detect wireless access points.

93
New cards

Hping3

A tool used to test the security of firewalls and map network topology.

- constructs specially crafted ICMP packets to evade measures to hide devices behind firewall

- scripting functionality to test firewall/IDS

94
New cards

Burp Suite

Burp Suite is a web assessment and analysis tool that looks for issues on websites such as cross-site scripting or SQL injection flaws.

95
New cards

Fuzzer

A type of tool that works by bombarding our applications with all manner of data and inputs from a wide variety of sources, in the hope that we can cause the application to fail or to perform in unexpected ways