WGU D430 Fundamentals of Information Security
Questions with Correct Answers 2026
Define ithe iconfidentiality iin ithe iCIA itriad. i- iCORRECT iANSWER i-Our iability ito iprotect idata
ifrom ithose iwho iare inot iauthorized ito iview iit.
Examples iof iconfidentiality i- iCORRECT iANSWER i-A ipatron iusing ian iATM icard iwants ito ikeep
itheir iPIN inumber iconfidential.
An iATM iowner iwants ito ikeep ibank iaccount inumbers iconfidential.
How ican iconfidentiality ibe ibroken? i- iCORRECT iANSWER i-Losing ia ilaptop
iAn iattacker igets iaccess ito iinfo
A iperson ican ilook iover iyour ishoulder
Define iintegrity iin ithe iCIA itriad. i- iCORRECT iANSWER i-The iability ito iprevent ipeople ifrom
ichanging iyour idata iand ithe iability ito ireverse iunwanted ichanges.
How ido iyou icontrol iintegrity? i- iCORRECT iANSWER i-Permissions irestrict iwhat iusers ican ido
i(read, iwrite, ietc.)
Examples iof iintegrity i- iCORRECT iANSWER i-Data iused iby ia idoctor ito imake imedical idecisions
ineeds ito ibe icorrect ior ithe ipatient ican idie.
Define ithe iavailability iin ithe iCIA itriad. i- iCORRECT iANSWER i-Our idata ineeds ito ibe iaccessible
iwhen iwe ineed iit.
, How ican iavailability ibe ibroken? i- iCORRECT iANSWER i-Loss iof ipower, iapplication iproblems. iIf
icaused iby ian iattacker, ithis iis ia iDenial iof iService iattack.
Questions with Correct Answers 2026
Define ithe iconfidentiality iin ithe iCIA itriad. i- iCORRECT iANSWER i-Our iability ito iprotect idata
ifrom ithose iwho iare inot iauthorized ito iview iit.
Examples iof iconfidentiality i- iCORRECT iANSWER i-A ipatron iusing ian iATM icard iwants ito ikeep
itheir iPIN inumber iconfidential.
An iATM iowner iwants ito ikeep ibank iaccount inumbers iconfidential.
How ican iconfidentiality ibe ibroken? i- iCORRECT iANSWER i-Losing ia ilaptop
iAn iattacker igets iaccess ito iinfo
A iperson ican ilook iover iyour ishoulder
Define iintegrity iin ithe iCIA itriad. i- iCORRECT iANSWER i-The iability ito iprevent ipeople ifrom
ichanging iyour idata iand ithe iability ito ireverse iunwanted ichanges.
How ido iyou icontrol iintegrity? i- iCORRECT iANSWER i-Permissions irestrict iwhat iusers ican ido
i(read, iwrite, ietc.)
Examples iof iintegrity i- iCORRECT iANSWER i-Data iused iby ia idoctor ito imake imedical idecisions
ineeds ito ibe icorrect ior ithe ipatient ican idie.
Define ithe iavailability iin ithe iCIA itriad. i- iCORRECT iANSWER i-Our idata ineeds ito ibe iaccessible
iwhen iwe ineed iit.
, How ican iavailability ibe ibroken? i- iCORRECT iANSWER i-Loss iof ipower, iapplication iproblems. iIf
icaused iby ian iattacker, ithis iis ia iDenial iof iService iattack.