WGU D430 OBJECTIVE ASSESSMENT FINAL
EXAM NEWEST 2025 ACTUAL EXAM
COMPLETE 250 QUESTIONS AND CORRECT
DETAILED ANSWERS (VERIFIED ANSWERS)
|ALREADY GRADED A+
A company was the victim of a security breach resulting in
stolen user credentials. An attacker used a stolen username and
password to log in to an employee email account.
Which security practice could have reduced the post-breach
impact of this event?
A Multi-factor authentication
B Operating system hardening
C Network segmentation
D Mutual authentication - ANSWER-Multi-factor authentication
A module in a security awareness course shows a user making
use of two-factor authentication using a hardware token.
Which security failure is being addressed by this training
module?
,2|Page
A Tailgating
B Pretexting
C Malware infections
D Weak passwords - ANSWER-Weak passwords
Which tool should an application developer use to help identify
input validation vulnerabilities?
A scanner
B filter
C fuzzer
D sniffer - ANSWER-fuzzer
A systems administrator enables operating system logging to
capture unsuccessful log in attempts.
Which attack can be uncovered by reviewing such logs?
A Brute force
B Denial of service
C Stolen password
D Spear phishing - ANSWER-Brute force
,3|Page
A student downloads free software from a website and this
software includes some malware.
Which tool can locate this vulnerability?
A Antivirus software
B Asymmetric encryption
C Honeypot
D Access control list - ANSWER-Antivirus software
Which type of tool can be used to detect vulnerabilities in source
code related to improper handling of user input?
A Fuzzer
B Port scanner
C Honeypot
D Sniffer - ANSWER-Fuzzer
A petroleum company has a group of computers used to monitor
flow of materials in the refining process. These computers are
never connected to the Internet or other corporate network, and
they host proprietary monitoring software which the company
has registered as a trade secret.
, 4|Page
Which type of security will be able to help protect its software
against theft?
A Network
B Physical
C Operating system
D Application - ANSWER-Physical
An organization wants to minimize the impact of user credential
theft by ensuring that only HR staff can access employee
personal information.
Which security mechanism should it implement?
A Apply the principle of least privilege.
B Apply the latest software patches.
C Remove all unnecessary services.
D Turn on logging and auditing. - ANSWER-Apply the principle
of least privilege.
An organization wants to prevent malware from infecting its
workstations, mobile devices, and web applications.
Which security tool should it implement?
A Antivirus