WGU D430 FUNDAMENTALS OF
INFORMATION SECURITY
QUESTIONS AND COMPLETE
SOLUTIONS (GRADED A+) LATEST
UPDATED 2025
WGU Fundamentals of Information Security D430
, lOMoARcPSD| 54339004
CIA Triad - Correct Answers Confidential - allowing only those authorized to access the data requested
Integrity - keeping data unaltered in an unauthorized manner and reliable
Availability - the ability for those authorized to access data when needed
Parkerian Hexad - Correct Answers Confidentiality Integrity Availability
Possession - physical deposition of the media on which the data is stored
Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data in
question
Utility - how useful the data is to us
Attack Types - Correct Answers Interception
Interruption
Modification
Fabrication
Interception - Correct Answers an attacker has access to data , applications or environment
Interruption - Correct Answers attacks cause our assets to become unusable or unavailable
Modification - Correct Answers attacks involve tampering with our asset
Fabrication - Correct Answers attacks that create false information
Threat - Correct Answers something that has potential to cause harm
Vulnerability - Correct Answers weaknesses that can be used to harm us
INFORMATION SECURITY
QUESTIONS AND COMPLETE
SOLUTIONS (GRADED A+) LATEST
UPDATED 2025
WGU Fundamentals of Information Security D430
, lOMoARcPSD| 54339004
CIA Triad - Correct Answers Confidential - allowing only those authorized to access the data requested
Integrity - keeping data unaltered in an unauthorized manner and reliable
Availability - the ability for those authorized to access data when needed
Parkerian Hexad - Correct Answers Confidentiality Integrity Availability
Possession - physical deposition of the media on which the data is stored
Authenticity - allows us to talk about the proper attribution as to the owner or creator of the data in
question
Utility - how useful the data is to us
Attack Types - Correct Answers Interception
Interruption
Modification
Fabrication
Interception - Correct Answers an attacker has access to data , applications or environment
Interruption - Correct Answers attacks cause our assets to become unusable or unavailable
Modification - Correct Answers attacks involve tampering with our asset
Fabrication - Correct Answers attacks that create false information
Threat - Correct Answers something that has potential to cause harm
Vulnerability - Correct Answers weaknesses that can be used to harm us