SECURITY: 2025–2026 LATEST EXAM WITH MOST
TEST QUESTIONS (HARVARD STYLE)
✅ Key Features:
Comprehensive coverage of the most tested information security exam topics
Updated for the 2025–2026 cycle to reflect current WGU D430 curriculum
requirements
Includes exam-style questions with clear, detailed answers and rationales
Every explanation supported with Harvard-style citations for academic integrity
Covers key domains: security principles, risk management, access control,
cryptography, and network defense
Structured to mirror the rigor and scope of WGU’s assessments
📘 Best For:
WGU students preparing for the D430 Fundamentals of Information Security
exam
Learners who want academically referenced study resources with applied examples
Students aiming to build both exam confidence and strong foundational IT security
knowledge
IT, cybersecurity, and computer science learners pursuing academic and professional
success
Your organization's network was recently the target of an attack. Fortunately, the new system you
installed took action and refused traffic from the source before you even had a chance to respond.
What system did you install?
An authorization system
A An intrusion detection system
B A logging system
C An intrusion prevention system
D An authentication system - CORRECT ANSWER-D
A surveillance video log contains a record, including the exact date and time, of an individual gaining
access to his company's office building after hours. He denies that he was there during that time, but
the existence of the video log proves otherwise. What benefit of accountability does this example
demonstrate?
Authorization
,A Deterrence
B Nonrepudiation
C Intrusion detection and prevention
D Authentication - CORRECT ANSWER-C
What process ensures compliance with applicable laws, policies, and other bodies of administrative
control, and detects misuse?
Deterrence
A Nonrepudiation
B Authorization
C Accountability
E Auditing - CORRECT ANSWER-E
___________ provides us with the means to trace activities in our environment back to their source.
Accountability
A Authentication
B Access
C Nonrepudiation
D Authorization - CORRECT ANSWER-A
Backordered Parts is a defense contractor that builds communications parts for the military. The
employees use mostly Web-based applications for parts design and information sharing. Due to the
sensitive nature of the business, Backordered Parts would like to implement a solution that secures
all browser connections to the Web servers. What encryption solution best meets this company's
needs?
Advanced Encryption Standard (AES)
A Blowfish
B Elliptic Curve Cryptography (ECC)
C Digital signatures - CORRECT ANSWER-C
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet
access. The company is concerned that a wily, computer-savvy competitor will send e-mail messages
,pretending to be from Shovels and Shingles to its customers, in an attempt to gather customer
information. What encryption solution best prevents a competitor from successfully impersonating
the company?
Elliptic Curve Cryptography (ECC)
A Blowfish
B SSL
C Advanced Encryption Standard (AES)
D Digital signatures - CORRECT ANSWER-E
Hashes provide _______, but not _______.
Integrity, confidentiality
A Availability, integrity
B Confidentiality, availability
C Confidentiality, integrity
D Integrity, availability - CORRECT ANSWER-A
The science of breaking through encryption is known as _____.
Cryptology
A Cryptography
B Cryptanalysis
C Ciphertext - CORRECT ANSWER-C
We are somewhat limited in our ability to protect which type of data?
Data in use
A Data at rest
B Data in motion - CORRECT ANSWER-A
Some standards are not mandated by law but are managed and enforced by the industry, often via a
council or committee. Which of the options below is an example of this industry compliance?
FISMA
A PCI DSS
, B SOX
C HIPAA
E GLBA - CORRECT ANSWER-B
______ sets limits on the use and disclosure of patient information and grants individuals rights over
their own health records.
HIPAA
A SOX
B GLBA
C FERPA
E PCI DSS - CORRECT ANSWER-A
______ ensures the protection of information, operations, and assets in federal government.
SOX
A PCI DSS
B FERPA
C HIPAA
E FISMA - CORRECT ANSWER-E
______ protects the privacy of students and their parents.
PCI DSS
A FISMA
B HIPAA
C GLBA
E FERPA - CORRECT ANSWER-E
______ regulates the financial practice and governance of corporations.
FERPA
A HIPAA
B GLBA