• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

DETAILED ANSWERSLATEST

WGU EXAM Dec 21, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

1

DETAILED ANSWERS|LATEST

PASS Confidentiality - ANSWER To keep secret. Allowing only authorized access to data

Integrity - ANSWER Unaltered, unmodified, intact, true value. Unaltered by accidental or malicious intent

Availability - ANSWER Accessible, online, up and running, can use, can connect to

Parkerian Hexad - ANSWER Possession/Control, authenticity, utility

Possession/Control - ANSWER Who holds the data? What CONTROLS guard the data?

Authenticity - ANSWER Genuine; Same; Valid; Truthful

Utility - ANSWER Usefulness, cost, has value, has worth, worth protecting, usable.

Symmetric Encryption - ANSWER A technique for encrypting data where the same key is used to both encrypt and decrypt data.

Asymmetric Encryption - ANSWER cryptographic algorithms that require two keys -- one of which is secret (or private) and one of which is public (freely known to others).

Algorithms for Symmetric Encryption - ANSWER DES, 3DES, AES

  • / 2

2

Algorithms for Asymmetric Encryption - ANSWER RSA, ECC, SHA

Hash - ANSWER a one-way encryption that's used to verify data integrity, validate passwords, or create digital signatures.

Why do we use hash? - ANSWER Authenticity, validity, checks and balances. To store a representation of sensitive data instead of the data itself

FISMA - Federal Information Security Modernization Act of 2014 - ANSWER provides a framework for ensuring the effectiveness of information security controls in government

HIPPA - Health Insurance Portability and Accountability Act - ANSWER requires privacy protection for individually identifiable health information. Safeguards patient privacy

HITECH - ANSWER Expands on HIPPA and is concerned with the transmission of Medical Information

FERPA - Family Education Rights and Privacy Act - ANSWER protects the privacy of students and their parents

SOX (Sarbanes-Oxley Act) - ANSWER regulates the financial practice by establishing requirements regarding reporting and disclosure practices to prevent fraud.

GLBA (Gramm-Leach-Bliley Act) - ANSWER protects the customers of financial institutions. Mandates disclosure of institutions' information collection & sharing practices; providing privacy notices & opt-outs to consumers

COPPA (Children's Online Privacy Protection Act) - ANSWER Aimed at protecting the online privacy and personal information of children under the age of 13.

  • / 2

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

This document featured practical examples that made learning easy. Such an outstanding resource!

Download Document

Buy This Document

$10.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: WGU EXAM
Added: Dec 21, 2025
Description:

DETAILED ANSWERS|LATEST PASS Confidentiality - ANSWER To keep secret. Allowing only authorized access to data Integrity - ANSWER Unaltered, unmodified, intact, true value. Unaltered by accidental o...

Unlock Now
$ 10.00