D430 - PA - Security Requirements (Actual Exam) Questions with verified Answers (Latest Update 2026) UPDATE!!

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/71

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:18 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

72 Terms

1
New cards

Definition of Symmetric-Key

A cryptographic key used for both encryption and decryption

2
New cards

Definition of Block Ciphers

A symmetric-key that encrypts/decrypts data in fixed sized bits

3
New cards

Definition of DES

Symmetric-key block cipher that encrypts data in blocks of 64 bits using a 56-bit key

4
New cards

Weaknesses of DES include-

- Small/weak key size

- Small bit size

5
New cards

Vulnerabilities of DES include-

- Brute force attacks

- Block replay attacks

6
New cards

Definition of AES

Symmetric-key block cipher that encrypts data in blocks of 128 bits using a key size of 128, 192, or 256 bits

7
New cards

Definition of Asymmetric-Key

Uses a public and private cryptographic key

8
New cards

Definition of Public Key

Half a key used within an Asymmetric-Key that is used for Encryption

9
New cards

Definition of Private Key

Half a key used within an Asymmetric-Key that is used for Decryption

10
New cards

Definition of RSA

An asymmetric algorithm for cryptography

11
New cards

Definition of SSL/TLS

Cryptographic protocols used to provide secure communication over a network

12
New cards

Definition of Confidentiality

Protection of sensitive information from unauthorized users who attempt to access and alter data

13
New cards

Methods of ensuring Confidentiality include-

- Encryption

- Access Control (permissions)

- Steganography (embedding hidden info)

14
New cards

Definition of Integrity

The protection of data from unauthorized modification, deletion, or alteration

- Ensures data is accurate, complete, and reliable

15
New cards

Methods of ensuring Integrity include-

- Antivirus Software

- Hashing

- Digital Signatures

- Certificates

16
New cards

Definition of Availability

The guarantee that data and systems are always running and accessible/usable to authorized users

17
New cards

What does Availability do?

Ensures that data systems are accessible and usable when needed

18
New cards

Methods of ensuring Availability include-

- Alarm Systems

-High redundancy

- Fault Tolerance

19
New cards

A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked.

Confidentiality

20
New cards

A technology firm maintains an alternate site that is running 24/7, and operations can be moved to this location in the event of a major disaster.

Availability

21
New cards

Employees need to have key cards in order to enter their company offices.

Confidentiality

22
New cards

Only authorized personnel at a company have write access to certain files. All other employees have only read access to these files.

Confidentiality

23
New cards

A hacker was able to crack a hashed message and change its contents.

Integrity

24
New cards

A company hashes their data files in order to monitor whether information has been tampered with.

Integrity

25
New cards

A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.

Availability

26
New cards

A company's network infrastructure uses load balancers which will distribute the "load" of tasks such as file requests and data routing to a variety of servers, thereby ensuring that no single device is overburdened.

Availability

27
New cards

A hacker uses a man-in-the-middle attack to intercept wireless traffic from users.

Confidentiality

28
New cards

A hacker launched a DDoS attack which flooded a website with unwanted traffic from a number of computers and took the site offline.

Availability

29
New cards

Two groups of the Parkerian Hexad include-

- CIA

- PPU

30
New cards

Definition of Possession

Ensuring that the right people have access to the right information at the right time

31
New cards

Definition of Physical (Security)

Measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm

32
New cards

Definition of Utility

Ensuring that information assets are functional, efficient, and effective

33
New cards

Definition of Stateful Firewall

Keeps track of the state of network connections, allowing it to make more informed decisions about which traffic to allow or block

34
New cards

Definition of Client-Side Attacks

An attacker targets a user's web browser, mobile app, or other software to compromise the security of the system, steal sensitive data, or disrupt service

35
New cards

Definition of Server-Side Attacks

An attacker targets a web server, database, or other infrastructure to compromise the security of the system, steal sensitive data, or disrupt service

36
New cards

Define SQL Injection

Web application vulnerability which allows an attacker to inject malicious SQL code into a web's database in order to extract or modify sensitive datay

37
New cards

Definition of a Threat

Something that has the potential to cause harm

38
New cards

Definition of Vulnerability

Weaknesses that threats can exploit to cause harm

39
New cards

Definition of Risk

The likelihood that something bad will happen

40
New cards

Definition of Impact

The value of the asset being threatened and uses it to calculate risk

41
New cards

Definition of Firewall

Network monitoring and control system that relies on predetermined security rules

42
New cards

"Static state" typically refers to-

Data at Rest

43
New cards

Definition of Data at Rest

Data that is stored on a device or medium, and is not currently being transmitted or processed

44
New cards

Examples of Data at Rest include-

- Files stored on hard/flash drives

- Data stored in a database

- Backup data

45
New cards

Vulnerabilities for Data at Rest include-

- Unauthorized access

- Data breaches

- Data corruption

46
New cards

Ways to protect Data at Rest include-

- Use of encryption

- Access Controls

- Backing up data

47
New cards

"In transit" typically refers to-

Data in Motion

48
New cards

Definition of Data in Motion

Data transmitted between devices, systems, or networks

49
New cards

Examples of Data in Motion include-

- Data transmitted over the internet

- Data being sent via email or messaging apps

- Data being transferred via Bluetooth or Wi-Fi

- Data being streamed from a server to a client

50
New cards

Vulnerabilities for Data in Motion include-

- Interception

- Eavesdropping

- Tampering

- Man-in-the-Middle attacks

51
New cards

Ways to protect Data in Motion include-

- Encryption

- Secure protocols

- Authentication and Authorization

- Secure networks

52
New cards

"Dynamic state" typically refers to-

Data in Use

53
New cards

Definition of Data in Use

Data being actively processed, accessed, or manipulated

54
New cards

Vulnerabilities for Data in Use include-

- Unauthorized access

- Data tampering

- Data exposure

- Memory-based attacks

55
New cards

Which attack targets the Confidentiality of data

Interception

56
New cards

Interruption, Modification, and Fabrication are handled in which categories of the CIA triad

Integrity and Availability

57
New cards

Definition of Interception

Unauthorized access, capture, or diversion of data while it is in transit

58
New cards

Examples of Interception include-

- Eavesdropping

- DNS spoofing

- Man-in-the-Middle attacks

- Packet sniffing

- Session hijacking

59
New cards

Definition of Interruption

The act of disrupting or breaking into a normal flow of events, processes, or communications

60
New cards

Types of Interruption include-

- Physical

- Logical

- Human

61
New cards

Causes of Interruption include-

- Hardware failure

- Software bugs

- Network congestion

- Cyber attacks

- Human error

62
New cards

Definition of Modification

Act of altering or changing data, information, or a system

63
New cards

Types of Modification include-

- Authorized

- Unauthorized

- Malicious

64
New cards

Examples of Modification include-

- Data tampering

- Malware injections

- SQL injection

- Watering Hole Attacks

65
New cards

Definition of Fabrication

Act of creating false or misleading information, data, or evidence with the intention of manipulating others

66
New cards

Types of Fabrication include-

- Data

- Identity

- Evidence

- System

67
New cards

Examples of Fabrication include-

- Fake data

- Fake identities

- Fake system logs

68
New cards

Examples of Physical Controls include-

- Locks

- Cameras

- Cases

- Guards

- Backup generators

69
New cards

Definition of Logical Controls

Protects the systems, networks, and environments that process, transmit, and store data

70
New cards

Examples of Logical Controls include-

- Passwords

- Encryption

- Access controls

- Firewalls

71
New cards

Definition of Administrative Control

Dictates how the users of an environment should behave based on rules, laws, policies, and procedures

72
New cards

Examples of Administrative Control includes-

- Employee screening

- Awareness training

- Separation of Duties

- Least Privilege Principle