QUESTIONS AND VERIFIED ACCURATE
SOLUTIONS (A+ GRADED)
|| 100% GUARANTEED PASS
<RECENT VERSION>
WGU D432 - Fundamentals of Information Security - Practice Exam
1. What is the primary goal of Information Security?
A) To ensure all software is up-to-date
B) To protect the confidentiality, integrity, and availability of information
C) To prevent any and all user errors
D) To enforce complex password policies
2. The "CIA Triad" consists of:
A) Confidentiality, Insurability, Access Control
B) Certification, Integrity, Availability
C) Confidentiality, Integrity, Availability
D) Compliance, Inspection, Authentication
3. Preventing the unauthorized disclosure of information is the definition of:
A) Integrity
B) Availability
C) Confidentiality
D) Non-repudiation
4. Ensuring that information is accessible when needed by authorized users
defines:
A) Integrity
B) Availability
C) Confidentiality
D) Accountability
,5. A hacker changes the amount of a check from $100 to $1000. This is a
violation of:
A) Confidentiality
B) Availability
C) Integrity
D) Authentication
6. A DDoS (Distributed Denial-of-Service) attack primarily impacts which
component of the CIA Triad?
A) Confidentiality
B) Integrity
C) Availability
D) Authentication
7. What does AAA stand for in cybersecurity?
A) Authentication, Authorization, Accounting
B) Access, Authority, Accounting
C) Authentication, Availability, Accounting
D) Access, Authorization, Availability
8. Verifying the identity of a user, system, or process is known as:
A) Authorization
B) Accounting
C) Authentication
D) Auditing
9. Determining what resources a user can access after they have been
authenticated is called:
A) Authentication
B) Authorization
C) Accounting
D) Auditing
10. Logging and tracking user activities on a system is an example of:
A) Authentication
B) Authorization
, C) Accounting
D) Availability
11. A security control that is automated (e.g., a firewall) is classified as:
A) Managerial
B) Technical
C) Operational
D) Physical
12. A company's security policy is an example of what type of control?
A) Technical
B) Operational
C) Managerial
D) Corrective
13. A fire suppression system is an example of what type of security control?
A) Managerial
B) Technical
C) Operational
D) Physical
14. A control that deters an incident (like a warning sign) is a ________
control.
A) Corrective
B) Detective
C) Preventive
D) Compensating
15. An Intrusion Detection System (IDS) is an example of a ________ control.
A) Corrective
B) Detective
C) Preventive
D) Compensating
16. A backup and restore procedure is an example of a ________ control.
A) Corrective
B) Detective