WGU D430 EXAM 2025 | ALL QUESTIONS AND CORRECT
ANSWERS | ALREADY GRADED A+ | LATEST EXAM |
VERIFIED ANSWERS | JUST RELEASED | WESTERN
GOVERNORS UNIVERSIY
Which security principle is Availability
being attacked?
A Possession
B Integrity
C Confidentiality
D Availability
A new start-up company File encryption
has started working on a
social networking website.
The company has
moved all its source
code to a cloud provider
and wants to protect
this source code from
unauthorized access.
Which cyber defense
concept should the start-
up company use to
maintain the
confidentiality of its source
code?
A Alarm systems
B Account permissions
C Antivirus software
D File encryption
1/88
,5/18/25, 7:03 PM WGU D430 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ | LATEST EXAM | VERIFIED A…
A company has an annual Threat
audit of installed software
and data storage systems.
During the audit, the
auditor asks how the
company's most critical data is
used. This
determination helps the
auditor ensure that the
proper defense
mechanisms are in
place to protect critical data.
Which cybersecurity term is
defined as the potential for
an attack on a resource?
A Impact
B Vulnerability
C Risk
D Threat
Which security type Honeypots
deliberately exposes a
system's vulnerabilities or
resources to an attacker?
A Intrusion detection
B Firewalls
C Honeypots
D Intrusion prevention
Which tool can be used to Port scanner
map devices on a network,
along with their operating
system types and
versions?
A Packet sniffer
B Packet filter
C Port scanner
D Stateful firewall
2/88
,5/18/25, 7:03 PM WGU D430 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ | LATEST EXAM | VERIFIED A…
Which web attack is a server- SQL injection
side attack?
A Clickjacking
B Cross-site scripting
C SQL injection
D Cross-site request forgery
An organization Data in motion
employs a VPN to
safeguard its
information.
Which security principle is
protected by a VPN?
A Data in motion
B Data at rest
C Data in use
D Data in storage
A malicious hacker was Interruption
successful in a
denial of service (DoS)
attack against an institution's
mail server. Fortunately, no
data was lost or altered
while the server was
offline.
Which type of attack is this?
A Modification
B Fabrication
C Interception
D Interruption
A company has had several Utility
successful
denial of service (DoS)
attacks on its email server.
Which principle of the
Parkerian hexad is the
auditor addressing?
A Possession
B Integrity
C Authenticity
D Utility
3/88
, 5/18/25, 7:03 PM WGU D430 EXAM 2025 | ALL QUESTIONS AND CORRECT ANSWERS | ALREADY GRADED A+ | LATEST EXAM | VERIFIED A…
Which web attack is possible SQL injection
due to a lack of input
validation?
A Extraneous files
B Clickjacking
C SQL injection
D Cross-site request forgery
Which file action implements Encryption
the principle of
confidentiality from the
CIA triad?
A Compression
B Hash
C Backup
D Encryption
Which cyber defense concept Principle of least privilege
suggests limiting
permissions to only what is
necessary to perform a
particular task?
A Authentication
B Authorization
C Defense in depth
D Principle of least privilege
A company institutes a new Confidentiality
policy that "All office
computer monitors must face
toward employees and must
face away from
doorways. The monitor
screens must not be
visible to people visiting
the office."
Which principle of the CIA
triad is this company
applying?
A Availability
B Confidentiality
4/88