100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430- Fundamentals of Information Security EXAM 2025 (Actual Exam) Questions with verified Answers (Latest Update 2025) UPDATE!!

Rating
-
Sold
-
Pages
28
Grade
A+
Uploaded on
19-10-2025
Written in
2025/2026

WGU D430- Fundamentals of Information Security EXAM 2025 (Actual Exam) Questions with verified Answers (Latest Update 2025) UPDATE!!

Institution
WGU D430- Fundamentals Of Information Security
Course
WGU D430- Fundamentals of Information Security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430- Fundamentals of Information Security
Course
WGU D430- Fundamentals of Information Security

Document information

Uploaded on
October 19, 2025
Number of pages
28
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D430 fundamentals of information security

1. Information se- protecting data, software, and hardware secure against unauthorized access, use,
curity disclosure, disruption, modification, or destruction.

2. Compliance The requirements that are set forth by laws and industry regulations.

IE: HIPPA/ HITECH- healthcare, PCI/DSS- payment card industry, FISMA- federal
government agencies

3. DAD Triad Disclosure, alteration, and denial

4. CIA Triad The core model of all information security concepts. Confidential, integrity and
availability

5. Confidential Ability to protect our data from those who are not authorized to view it.

6. What ways can - lose a personal laptop with data
confidentiality be - Person can view your password you are entering in
compromised? - Send an email attachment to the wrong person.
- Attacker can penetrate your systems....etc.

7. integrity Keeping data unaltered by accidental or malicious intent

8. How to maintain Prevent unauthorized changes to the data and the ability to reverse unwanted
integrity? authorized changes.

Via system/file permissions or Undo/Roll back undesirable changes.

9. Availability The ability to access data when needed

10. Ways Availability - Power loss
can be compro- - Application issues
mised - Network attacks
- System compromised (DoS)




, WGU D430 fundamentals of information security

11. Denial of Service Security problem in which users are not able to access an information system; can
(DoS) be caused by human errors, natural disaster, or malicious activity.

12. Parkerian hexad A model that adds three more principles to the CIA triad:
model
Possession/Control
Utility
Authenticity




13. Possession/ con- Refers to the physical disposition of the media on which the data is stored; This
trol allows you to discuss loss of data via its physical medium.

14. Principle of Pos- Lost package (encrypted USB's and unencrypted USB's)
session example
possession is an issue because the tapes are physically lost.

(Unencrypted is compromised via confidentiality and possession; encrypted is
compromised only via possession).

15. Principle of Au- Allows you to say whether you've attributed the data in question to the proper
thenticity owner/creator.

16. Ways authentici- Sending an email but altering the message to look like it came from someone
ty can be com- else, than the original one that was sent.
promised

17. Utility How useful the data is to you.

Ex. Unencrypted (a lot of utility) Encrypted (little utility).


, WGU D430 fundamentals of information security


18. Security Attacks Broken down from the type of attack, risk the attack represents, and controls you
might use to mitigate it.

19. Types of attacks 1- interception
2- interruption
3- modification
4- fabrication

20. Interception Attacks allows unauthorized users to access our data, applications, or environ-
ments.

Primarily an attack against confidentiality

21. Interception At- Unauthorized file viewing, copying, eavesdropping on phone conversations, read-
tack Examples ing someone's emails.

22. Interruption Attacks cause our assets to become unstable or unavailable for our use, on a
temporary or permanent basis.

This attack affects availability but can also attack integrity

23. Interruption At- DoS attack on a mail server; availability attack
tack Examples
Attacker manipulates the processes on which a database runs to prevent access;
integrity attack.

Could also be a combo of both.

24. Modification Attacks involve tampering with our asset.

Such attacks might primarily be considered an integrity attack, but could also be
an availability attack.

25.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CodedNurse Nightingale College
View profile
Follow You need to be logged in order to follow users or courses
Sold
3796
Member since
1 year
Number of followers
20
Documents
8755
Last sold
1 day ago
coded

"I specialize in key academic areas such as Psychology, Nursing, Human Resource Management, and Mathematics. Providing students with top-quality work is my priority, and I always uphold the highest scholarly standards. This commitment has earned me the distinction of being a Gold-Rated Tutor on Stuvia. You can trust my work to help you achieve excellent grades!"

3.4

65 reviews

5
18
4
16
3
15
2
3
1
13

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions