4/28/25, 4:21 PM WGU D430 fundamentals of information security
WGU D430 Fundamentals of information security | PA and OA
| Explore New 246 Questions and Answers | 2025 Update |
100% Correct.
Correct
Incorrect
WGU D430
246 Correct terms
Questions and answers
overflows
conditions
attacks
attacks
attacks
,4/28/25, 4:21 PM WGU D430 fundamentals of information security
Defense by Layer: Network Ways Availability can be
perimeter compromised
software development
Post incident activity phase
vulnerabilities
Don't know?
2 of 246
Definition
Depending on the type of physical media on which our data is
stored, any number of adverse physical conditions may be
problematic or harmful to their integrity. Such media are often
sensitive to temperature, humidity, magnetic fields, electricity,
impact, and more, with each type of media having its particular
strong and weak points.
Give this one a go later!
Physical concerns for data Protocol issues
Accountability Exploit framework
Don't know?
3 of 246
,4/28/25, 4:21 PM WGU D430 fundamentals of information security
Definition
A network utility designed to scan a network and create a map.
Frequently used as a vulnerability scanner. (Network mapper)
Give this one a go later!
Vpn Nmap
Kismet Hping3
Don't know?
4 of 246
Definition
information about an individual that identifies, links, relates, or
describes them.
Give this one a go later!
Rogue access point Personal equipment
Personally Identifiable
Physical Concerns For data
Information (PII)
Don't know?
, 4/28/25, 4:21 PM WGU D430 fundamentals of information security
5 of 246
Definition
Allowing us to access the contents of a file or directory
Give this one a go later!
Write Read
Execute Get
Don't know?
6 of 246
Definition
Identify any weaknesses that exist in our assets
Give this one a go later!
Assess Vulnerabilities Identify Threats
Assess Risks Acess Control
Don't know?
WGU D430 Fundamentals of information security | PA and OA
| Explore New 246 Questions and Answers | 2025 Update |
100% Correct.
Correct
Incorrect
WGU D430
246 Correct terms
Questions and answers
overflows
conditions
attacks
attacks
attacks
,4/28/25, 4:21 PM WGU D430 fundamentals of information security
Defense by Layer: Network Ways Availability can be
perimeter compromised
software development
Post incident activity phase
vulnerabilities
Don't know?
2 of 246
Definition
Depending on the type of physical media on which our data is
stored, any number of adverse physical conditions may be
problematic or harmful to their integrity. Such media are often
sensitive to temperature, humidity, magnetic fields, electricity,
impact, and more, with each type of media having its particular
strong and weak points.
Give this one a go later!
Physical concerns for data Protocol issues
Accountability Exploit framework
Don't know?
3 of 246
,4/28/25, 4:21 PM WGU D430 fundamentals of information security
Definition
A network utility designed to scan a network and create a map.
Frequently used as a vulnerability scanner. (Network mapper)
Give this one a go later!
Vpn Nmap
Kismet Hping3
Don't know?
4 of 246
Definition
information about an individual that identifies, links, relates, or
describes them.
Give this one a go later!
Rogue access point Personal equipment
Personally Identifiable
Physical Concerns For data
Information (PII)
Don't know?
, 4/28/25, 4:21 PM WGU D430 fundamentals of information security
5 of 246
Definition
Allowing us to access the contents of a file or directory
Give this one a go later!
Write Read
Execute Get
Don't know?
6 of 246
Definition
Identify any weaknesses that exist in our assets
Give this one a go later!
Assess Vulnerabilities Identify Threats
Assess Risks Acess Control
Don't know?