100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS 100% CORRECT!!! LATEST UPDATED 2025

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
12-04-2025
Written in
2024/2025

WGU D430 QUESTIONS AND ANSWERS WITH VERIFIED SOLUTIONS 100% CORRECT!!! LATEST UPDATED 2025












Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 12, 2025
Number of pages
32
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu d430

Content preview

WGU D430 QUESTIONS AND
ANSWERS WITH VERIFIED
SOLUTIONS 100% CORRECT!!!
LATEST UPDATED 2025



D430 Quiz Questions 1

, lOMoARcPSD| 54339004




Which of the following is NOT a security principle?

A. Confidentiality

B. Integrity

C. Availability

D. Efficiency

Answer: D

Explanation: The three security principles are confidentiality, integrity, and availability (Andress, 2019,



What is the primary goal of cyber defense?

A. To prevent unauthorized access to systems and data

B. To maximize system efficiency

C. To improve system performance

D. To reduce maintenance costs

Answer: A
Explanation: The primary goal of cyber defense is to prevent unauthorized access to systems and data
(Andress, 2019, p. 15).



Which security principle is violated when a hacker gains unauthorized access to a system?

A. Confidentiality

B. Integrity

C. Availability

D. Efficiency

Answer: A

Explanation: When a hacker gains unauthorized access to a system, it violates the confidentiality security
principle (Andress, 2019, p. 11).



What is the purpose of a firewall?

A. To prevent unauthorized access to a network
B. To increase network speed

C. To detect and remove viruses

D. To encrypt network traffic

, lOMoARcPSD| 54339004




Answer: A

Explanation: The purpose of a firewall is to prevent unauthorized access to a network (Andress, 2019, p. 163).



What is a honeypot?

A. A vulnerable system designed to attract attackers

B. A tool for detecting network vulnerabilities

C. An encryption tool for securing data

D. A type of virus that spreads through a network

Answer: A

Explanation: A honeypot is a vulnerable system designed to attract attackers (Andress, 2019, p. 165).



What is the purpose of a vulnerability assessment tool like Nessus?

A. To identify and prioritize security vulnerabilities in a network

B. To encrypt network traffic

C. To prevent unauthorized access to a network

D. To monitor network traffic for security threats

Answer: A

Explanation: The purpose of a vulnerability assessment tool like Nessus is to identify and prioritize security
vulnerabilities in a network (Andress, 2019, p. 185).



Which of the following is a vulnerability assessment tool made by Rapid7?

A. Nessus

B. Metasploit

C. CANVAS

D. Nikto

Answer: B

Explanation: Metasploit is a vulnerability assessment tool made by Rapid7 (Andress, 2019, p. 186).

What is the purpose of a web server analysis tool like Nikto?

A. To identify and prioritize security vulnerabilities in a web server

B. To encrypt web server traffic

C. To prevent unauthorized access to a web server

, lOMoARcPSD| 54339004




D. To monitor web server traffic for security threats

Answer: A

Explanation: The purpose of a web server analysis tool like Nikto is to identify and prioritize security
vulnerabilities in a web server (Andress, 2019, p. 207).



What is the purpose of the FISMA framework?

A. To establish information security policies and procedures for federal agencies

B. To regulate the use of personal health information

C. To protect student educational records

D. To ensure the security of financial data

Answer: A

Explanation: The purpose of the FISMA framework is to establish information security policies and
procedures for federal agencies (Andress, 2019, p. 262).



Which of the following acts regulates the use of personal health information?

A. FISMA

B. HIPAA Accountability Act

C. FERPA Act
D. SOX

Answer: B

Explanation: The HIPAA Accountability Act regulates the use of personal health information (Andress, 2019,
p. 264).



What is the purpose of the FERPA Act?

A. To protect student educational records

B. To establish information security policies and procedures for federal agencies

C. To regulate the use of personal health information

D. To ensure the security of financial data

Answer: A

Explanation: The purpose of the FERPA Act is to protect student educational records (Andress, 2019, p. 264).



Which of the following is NOT a requirement of the GLBA?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TESTSMASTER Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
70
Member since
11 months
Number of followers
2
Documents
8760
Last sold
1 week ago

4.3

16 reviews

5
11
4
2
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions