100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Fundamentals of Information Security D430questions and answers

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
04-02-2026
Written in
2025/2026

WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers WGU Fundamentals of Information Security D430questions and answers

Show more Read less
Institution
WGU
Course
WGU

Content preview

WGU Fundamentals of Information Security
D430questions and answers 2026\2027


CIA Triad
- correct answer Confidential - allowing only those authorized to access the data

requested Integrity - keeping data unaltered in an unauthorized manner and

reliable

Availability - the ability for those authorized to access data when needed



Parkerian Hexad
- correct answer Confidentiality Integrity Availability

Possession - physical deposition of the media on which the data is stored

Authenticity - allows us to talk about the proper attribution as to the owner or creator of the
data in question

Utility - how useful the data is to us



Attack Types
- correct answer

Interception Interruption

Modification

Fabrication



Interception
- correct answer an attacker has access to data , applications or environment



Interruption
- correct answer attacks cause our assets to become unusable or unavailable



Modification
- correct answer attacks involve tampering with our asset

,Fabrication
- correct answer attacks that create false information



Threat
- correct answer something that has potential to cause harm



Vulnerability
- correct answer weaknesses that can be used to harm us



Something you know
- correct answer username , password , PIN



Something you have
- correct answer ID badge , swipe card , OTP



Something you are
- correct answer fingerprint, Iris Retina scan



Somewhere you are
- correct answer geolocation



Something you do
- correct answer handwriting , typing , walking



Authentication
- correct answer verifying that a person is who they claim to be



Mutual authentication
- correct answer Both parties in a transaction to authenticate each other

- Has digital certificates

- Prevents man in the middle attacks

, - The man in the middle is where the attacker inserts themselves into the traffic flow

- Ex . Both the PC and server authenticate each other before data is sent in either direction



Risk management process
- correct answer 1. Identify Asset - identifying and categorizing assets that we're protecting

2. Identify Threats - identify threats

3. Assess Vulnerabilities - look for impacts

4. Assess Risk - asses the risk overall

5. Mitigate Risk - ensure that a given type of threat is accounted for



Incident response process
- correct answer Preparation Detection and

Analysis Identification

Containment

Eradication

Recovery Post -

incident activity



Preparation
- correct answer the activities that we can perform , in advance of the incident itself in order to
better enable us to handle it .



Detection and Analysis (Identification)
- correct answer detect the occurrence of an issue and decide whether or not it is actually an
incident so that we can respond appropriately to it .



Containment
- correct answer involves taking steps to ensure that the situation does not cause any more
damage than it already has , or to at least lessen any ongoing harm



Eradication
- correct answer attempt to remove the effects of the issue from our environment

Document information

Uploaded on
February 4, 2026
Number of pages
19
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QUIVERS Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
143
Member since
1 year
Number of followers
9
Documents
807
Last sold
3 hours ago
REALITIEXAMS

On this page, you find all documents, package deals, and flashcards offered by seller QUIVERS

4.0

28 reviews

5
16
4
3
3
5
2
0
1
4

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions