Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 / C836 Fundamentals of Information Security- Study test in depth Examination and 100% correctly verified Solutions Latest version 2025/2026

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
09-03-2026
Written in
2025/2026

WGU D430 / C836 Fundamentals of Information Security- Study test in depth Examination and 100% correctly verified Solutions Latest version 2025/2026 A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block - correct answer Block cipher A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time - correct answer Stream cipher A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook (TCB) mode - correct answer AES Also known as public key cryptography, this method uses two keys: a public key and a private key. - correct answer Asymmetric key cryptography Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic - correct answer Secure Sockets Layer (SSL) protocol Also referred to as message digests, these functions do not use a key - correct answer Hash functions Infrastructure that includes the CAs that issue and verify certificates and the registration authorities (RAs) that verify the identity of the individuals associated with the certificates - correct answer Public key infrastructure (PKI) ______ regulates the financial practice and governance of corporations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.GLBA B.FISMA C.SOX D.FERPA E.HIPAA - correct answer C.SOX Regulations mandated by law, usually requiring regular audits and assessments - correct answer Regulatory Compliance This act safeguards privacy through the establishment of procedural and substantive rights in personal data - correct answer The Federal Privacy Act of 1974 Question : Risk can be higher when ___________ services are used for computing operations. This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A.auditing B.competitive intelligence C.cloud computing D.OPSEC - correct answer C.cloud computing

Show more Read less
Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Content preview

WGU D430 / C836 Fundamentals of Information Security-
Study test in depth Examination and 100% correctly verified
Solutions Latest version 2025/2026

A type of cipher that takes a predetermined number of bits in the plaintext message
(commonly 64 bits) and encrypts that block - correct answer Block cipher


A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time - correct
answer Stream cipher


A set of symmetric block ciphers endorsed by the US government through NIST. Shares
the same block modes that DES uses and also includes other modes such as XEX-
based Tweaked CodeBook (TCB) mode - correct answer AES


Also known as public key cryptography, this method uses two keys: a public key and a
private key. - correct answer Asymmetric key cryptography


Uses the RSA algorithm, an asymmetric algorithm, to secure web and email traffic -
correct answer Secure Sockets Layer (SSL) protocol


Also referred to as message digests, these functions do not use a key - correct answer
Hash functions


Infrastructure that includes the CAs that issue and verify certificates and the registration
authorities (RAs) that verify the identity of the individuals associated with the certificates
- correct answer Public key infrastructure (PKI)


______ regulates the financial practice and governance of corporations. This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform
this task are A to H and alt+1 to alt+9.


A.GLBA

,B.FISMA
C.SOX
D.FERPA
E.HIPAA - correct answer C.SOX


Regulations mandated by law, usually requiring regular audits and assessments -
correct answer Regulatory Compliance


This act safeguards privacy through the establishment of procedural and substantive
rights in personal data - correct answer The Federal Privacy Act of 1974


Question : Risk can be higher when ___________ services are used for computing
operations. This task contains the radio buttons and checkboxes for options. The
shortcut keys to perform this task are A to H and alt+1 to alt+9.


A.auditing
B.competitive intelligence
C.cloud computing
D.OPSEC - correct answer C.cloud computing


Laws of OPSEC


1.If you don't know what to protect, how do you know you are protecting it?


2.If you don't know the threat, how do you know what to protect?


3.If you are not protecting it (i.e. the information), THE DRAGON WINS! - correct
answer 1.If you don't know the threat, how do you know what to protect?


2.If you don't know what to protect, how do you know you are protecting it?

,3.If you are not protecting it (i.e. the information), THE DRAGON WINS!


During what phase of the operations security process do we match threats and
vulnerabilities? T


A.Assessment of risks
B.Analysis of vulnerabilities
C.Analysis of threats
D.Identification of critical information
E.Application of countermeasures - correct answer A.Assessment of risks


Haas' second law of operations security, "If you don't know what to protect, how do you
know you are protecting it?," maps to what step in the operations security process?


A.Analysis of threats
B.Analysis of vulnerabilities
C.Assessment of risks
D.Application of countermeasures
E.Identification of critical information - correct answer E.Identification of critical
information


You are leaving for an extended vacation and want to take steps to protect your home.
You set a timer to turn lights and the TV on and off at various times throughout the day,
suspend the mail delivery, and arrange for a neighbor to come in and water the plants.
What step in the operations security process do these actions demonstrate? This task
contains the radio buttons and checkboxes for options. The shortcut keys to perform
this task are A to H and alt+1 to alt+9.


A.Identification of critical information
B.Analysis of threats

, C.Analysis of vulnerabilities
D.Assessment of risks
E.Application of countermeasures - correct answer E.Application of countermeasures


The process of intelligence gathering and analysis to support business decisions is
known as _______.


A.Competitive intelligence
B.Competitive business
C.Business intelligence
D.Business competition
E.Counter intelligence - correct answer A.Competitive intelligence


The study that was conducted to discover the cause of the information leak during the
Vietnam War was codenamed ________ and is now considered a symbol of OPSEC.


A.Sun Tzu
B.Vietnam Viper
C.The Art of War
D.Purple Dragon - correct answer D.Purple Dragon


The process of intelligence gathering and analysis in order to support business
decisions - correct answer Competitive intelligence


Name the five steps of the operations security process
1.Identification of critical information
2.Analysis of threats
3.Analysis of vulnerabilities
4.Assessment of risks

Written for

Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Document information

Uploaded on
March 9, 2026
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
KieranKent55 NONE
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
2 year
Number of followers
18
Documents
6452
Last sold
3 months ago

3.6

9 reviews

5
4
4
1
3
2
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions