100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C836/D430 Fundamentals of Information Security 2025 | 140+ Verified Practice Questions with Correct Answers and Rationales | Complete Study Guide for Cybersecurity Awareness, Risk Management, and IT Security Best Practices

Rating
-
Sold
-
Pages
35
Grade
A+
Uploaded on
21-07-2025
Written in
2024/2025

WGU C836/D430 Fundamentals of Information Security 2025 | 140+ Verified Practice Questions with Correct Answers and Rationales | Complete Study Guide for Cybersecurity Awareness, Risk Management, and IT Security Best Practices

Institution
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY

Document information

Uploaded on
July 21, 2025
Number of pages
35
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C836/D430 Fundamentals of Information Security 2025 |
140+ Verified Practice Questions with Correct Answers and
Rationales | Complete Study Guide for Cybersecurity
Awareness, Risk Management, and IT Security Best Practices
QUESTION 1:
What is the primary goal of information security?

A) To increase profits
B) To protect information from unauthorized access and alteration
C) To promote technology
D) To enhance customer service

Correct Option: B) To protect information from unauthorized access and alteration
Rationale: The main objective is to safeguard data integrity, confidentiality, and availability.



QUESTION 2:
Which of the following is a key principle of information security?

A) Profit maximization
B) Confidentiality, Integrity, Availability (CIA)
C) Enhanced user experience
D) Data redundancy

Correct Option: B) Confidentiality, Integrity, Availability (CIA)
Rationale: CIA is the foundational model for information security.



QUESTION 3:
What does the term "threat" refer to in information security?

A) A system vulnerability
B) Any potential danger that could exploit a vulnerability
C) A method of protection
D) An active attack

Correct Option: B) Any potential danger that could exploit a vulnerability
Rationale: Threats can lead to security breaches if not managed properly.



QUESTION 4:
Which of the following is a common type of malware?

A) Firewall
B) Virus
C) Encryption
D) VPN

Correct Option: B) Virus
Rationale: Viruses are a type of malware designed to replicate and spread.

,QUESTION 5:
What is the purpose of a firewall?

A) To encrypt data
B) To monitor and control incoming and outgoing network traffic
C) To store sensitive information
D) To enhance performance

Correct Option: B) To monitor and control incoming and outgoing network traffic
Rationale: Firewalls act as a barrier between trusted and untrusted networks.



QUESTION 6:
What does "social engineering" refer to in the context of information security?

A) A technical exploit
B) Manipulating individuals into divulging confidential information
C) A method of encryption
D) A type of firewall

Correct Option: B) Manipulating individuals into divulging confidential information
Rationale: Social engineering exploits human psychology rather than technical vulnerabilities.



QUESTION 7:
Which of the following is an example of a physical security control?

A) Antivirus software
B) Security guards
C) Encryption
D) Firewalls

Correct Option: B) Security guards
Rationale: Physical security controls protect physical assets and facilities.



QUESTION 8:
What is the primary function of encryption in information security?

A) To backup data
B) To protect data confidentiality
C) To enhance system performance
D) To monitor user activity

Correct Option: B) To protect data confidentiality
Rationale: Encryption ensures that data remains unreadable to unauthorized users.



QUESTION 9:
What does the term "vulnerability" mean in the context of information security?

,A) A security control
B) A weakness in a system that can be exploited
C) A threat actor
D) A type of malware

Correct Option: B) A weakness in a system that can be exploited
Rationale: Vulnerabilities can be targets for attacks if not properly addressed.



QUESTION 10:
Which type of attack involves overwhelming a system with traffic?

A) Phishing
B) Denial of Service (DoS)
C) Man-in-the-middle
D) SQL Injection

Correct Option: B) Denial of Service (DoS)
Rationale: DoS attacks aim to make a service unavailable by overwhelming it.



QUESTION 11:
What is the purpose of multi-factor authentication (MFA)?

A) To simplify user access
B) To enhance security by requiring multiple forms of verification
C) To reduce password complexity
D) To store user credentials

Correct Option: B) To enhance security by requiring multiple forms of verification
Rationale: MFA adds layers of security to the authentication process.



QUESTION 12:
What is an intrusion detection system (IDS) used for?

A) To prevent attacks
B) To monitor and analyze network traffic for signs of malicious activity
C) To encrypt data
D) To control access

Correct Option: B) To monitor and analyze network traffic for signs of malicious activity
Rationale: IDS helps identify potential security breaches in real time.



QUESTION 13:
What does "data integrity" refer to in information security?

A) Data availability
B) The accuracy and consistency of data over its lifecycle

, C) Data confidentiality
D) Data redundancy

Correct Option: B) The accuracy and consistency of data over its lifecycle
Rationale: Maintaining data integrity ensures trustworthiness of information.



QUESTION 14:
Which of the following is a best practice for password security?

A) Using the same password for multiple accounts
B) Using a mix of letters, numbers, and symbols
C) Changing passwords every few years
D) Writing passwords down

Correct Option: B) Using a mix of letters, numbers, and symbols
Rationale: Strong, complex passwords are harder to crack.



QUESTION 15:
What role does a Security Information and Event Management (SIEM) system play?

A) Data backup
B) Centralizes monitoring and analysis of security events
C) User authentication
D) Malware removal

Correct Option: B) Centralizes monitoring and analysis of security events
Rationale: SIEM systems help in identifying and responding to security incidents.



QUESTION 16:
What is "phishing"?

A) A method of securing data
B) An attempt to trick individuals into revealing sensitive information
C) A type of firewall
D) A network monitoring technique

Correct Option: B) An attempt to trick individuals into revealing sensitive information
Rationale: Phishing typically involves deceptive emails or messages.



QUESTION 17:
Which of the following is an example of a technical control?

A) Security policies
B) Encryption software
C) Employee training
D) Physical barriers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
brightonmunene Wgu
View profile
Follow You need to be logged in order to follow users or courses
Sold
903
Member since
6 months
Number of followers
6
Documents
1582
Last sold
2 days ago
Brighton Academic Hub

Welcome to Brighton Lighton’s academic store — your trusted source for high-quality, well-organized study materials designed to help you excel. Each document is immediately available after purchase in both online and downloadable PDF formats, with no restrictions. All files are carefully prepared and regularly updated to ensure accuracy, relevance, and ease of understanding. If you encounter any issue accessing a file after payment, feel free to contact me directly and I will personally send you the document promptly. Your satisfaction and academic success are my top priority.

Read more Read less
3.8

18 reviews

5
10
4
2
3
2
2
1
1
3

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions