WGU C836 Object Assessment Fundamentals of Information Security Exam| 100% Correct| Questions and Verified Answers| 2023/ 2024 Update
Update
Q: What is a risk?
Answer:
the likelihood that something bad will happen from a threat exploiting a vulnerability
Q: What in an impact?
Answer:
The value of the assets being threatened
Q: Physical Controls
Answer:
Locks, fences, doors, and guards are examples of
Q: Technical Controls
Answer:
Firewalls, IPS, IDS, and Anti-Virus are examples of
Q: Administrative Controls
WGU C836 Object Assessment Fundamentals
of Information Security Exam| 100% Correct|
Questions and Verified Answers| 2023/ 2024
Answer:
Acceptable Use Policies and Email Policies are examples of
Q: Symmetric Crypography
Answer:
uses a single key for encrypting and decrypting
Q: Asymmetric Cryptography
Answer:
uses two keys for encrypting and decrypting
Q: Hash Function
Answer:
keyless, but uses a fixed length string of letters and numbers
Q: Digital Signatures
Answer:
shows message was sent by user, works directly with nonrepudiation
Q: Certificates (CA)
Answer:
links a public key to an individual and used as a form of electronic identification.
Q: Block Cypher
Answer:
Encryption of an entire block
Q: Stream Cypher
Answer:
Encryption of one bit at a time
Q: DES
Answer:
56 bit key block cypher
Q: 3DES
Answer:
Encryption of a block 3 times over
Q: AES
Answer:
Replaced DES, uses 3 different cyphers within a 128-bit, 192-bit, and 256-bit keys.
Q: RSA
Powered by https://learnexams.com/search/study?query=