100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE ASSESSMENT NEWEST 2025/2026 TEST BANK ACTUAL EXAM 82 QUESTIONS AND CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
05-11-2025
Written in
2025/2026

1. What is the primary goal of information security? A. To prevent all security incidents B. To protect the confidentiality, integrity, and availability of information C. To implement the latest security technologies D. To ensure user convenience Answer: B. To protect the confidentiality, integrity, and availability of information 2. The security principle that ensures information is not disclosed to unauthorized individuals, entities, or processes is known as: A. Integrity B. Availability C. Confidentiality D. Accountability Answer: C. Confidentiality 3. Which term describes the assurance that data has not been altered in an unauthorized manner? A. Confidentiality B. Availability C. Integrity D. Non-repudiation Answer: C. Integrity 4. A Distributed Denial-of-Service (DDoS) attack primarily impacts which pillar of the CIA triad? A. Confidentiality B. Integrity C. Availability D. Authentication Answer: C. Availability 5. What is a primary objective of a risk management program? A. To eliminate all risk B. To identify, assess, and mitigate risks to an acceptable level C. To transfer all risk to a third party D. To ignore risks that are unlikely to occur Answer: B. To identify, assess, and mitigate risks to an acceptable level 6. The process of identifying potential threats and vulnerabilities to an organization's operations and assets is called: A. Risk Mitigation B. Risk Assessment C. Risk Avoidance D. Risk Transfer Answer: B. Risk Assessment 7. Which risk response strategy involves taking action to reduce the likelihood or impact of a risk? A. Risk Acceptance B. Risk Avoidance C. Risk Mitigation D. Risk Transfer Answer: C. Risk Mitigation 8. Purchasing cybersecurity insurance is an example of which risk response strategy? A. Risk Acceptance B. Risk Avoidance C. Risk Mitigation D. Risk Transfer Answer: D. Risk Transfer 9. A document that defines the scope, objectives, and procedures for a risk assessment is known as a: A. Risk Assessment Report B. Risk Management Plan C. Business Impact Analysis D. System Security Plan Answer: B. Risk Management Plan A. Annualized Loss Expectancy (ALE) 10. Which of the following is a qualitative, not quantitative, risk assessment factor? B. Single Loss Expectancy (SLE) C. High, Medium, Low impact rating D. Exposure Factor (EF) Answer: C. High, Medium, Low impact rating 11. What is the formula for calculating Annualized Loss Expectancy (ALE)? A. ALE = Asset Value (AV) x Exposure Factor (EF) B. ALE = Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO) C. ALE = Threat x Vulnerability D. ALE = SLE / ARO Answer: B. ALE = Single Loss Expectancy (SLE) x Annualized Rate of Occurrence (ARO)

Show more Read less
Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
Course
WGU D430 FUNDAMENTALS OF INFORMATION SECURITY

Document information

Uploaded on
November 5, 2025
Number of pages
22
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM OBJECTIVE
ASSESSMENT NEWEST 2025/2026 TEST BANK ACTUAL EXAM 82 QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS) |ALREADY GRADED A+



1. What is the primary goal of information security?

A. To prevent all security incidents
B. To protect the confidentiality, integrity, and availability of information

C. To implement the latest security technologies

D. To ensure user convenience

Answer: B. To protect the confidentiality, integrity, and availability of information



2. The security principle that ensures information is not disclosed to unauthorized individuals,
entities, or processes is known as:

A. Integrity

B. Availability

C. Confidentiality
D. Accountability

Answer: C. Confidentiality



3. Which term describes the assurance that data has not been altered in an unauthorized
manner?

A. Confidentiality

B. Availability

C. Integrity

D. Non-repudiation
Answer: C. Integrity

, 4. A Distributed Denial-of-Service (DDoS) attack primarily impacts which pillar of the CIA
triad?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Answer: C. Availability


5. What is a primary objective of a risk management program?
A. To eliminate all risk

B. To identify, assess, and mitigate risks to an acceptable level

C. To transfer all risk to a third party

D. To ignore risks that are unlikely to occur

Answer: B. To identify, assess, and mitigate risks to an acceptable level


6. The process of identifying potential threats and vulnerabilities to an organization's operations
and assets is called:

A. Risk Mitigation

B. Risk Assessment

C. Risk Avoidance
D. Risk Transfer

Answer: B. Risk Assessment



7. Which risk response strategy involves taking action to reduce the likelihood or impact of a
risk?

A. Risk Acceptance
B. Risk Avoidance
C. Risk Mitigation

, D. Risk Transfer

Answer: C. Risk Mitigation



8. Purchasing cybersecurity insurance is an example of which risk response strategy?
A. Risk Acceptance

B. Risk Avoidance

C. Risk Mitigation

D. Risk Transfer

Answer: D. Risk Transfer



9. A document that defines the scope, objectives, and procedures for a risk assessment is known
as a:

A. Risk Assessment Report

B. Risk Management Plan
C. Business Impact Analysis

D. System Security Plan

Answer: B. Risk Management Plan



10. Which of the following is a qualitative, not quantitative, risk assessment factor?

A. Annualized Loss Expectancy (ALE)

B. Single Loss Expectancy (SLE)
C. High, Medium, Low impact rating

D. Exposure Factor (EF)

Answer: C. High, Medium, Low impact rating



11. What is the formula for calculating Annualized Loss Expectancy (ALE)?
A. ALE = Asset Value (AV) x Exposure Factor (EF)
$10.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
micahgeorge

Get to know the seller

Seller avatar
micahgeorge Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 months
Number of followers
0
Documents
35
Last sold
-
Micah George

You will get solutions to all subjects in both assignments and major exams. Contact me for any assistance. Good luck! Simple well-researched education material for you. Expertise in Nursing, Mathematics, Psychology, Biology ,CVA etc. My Work contains the latest, updated Exam Solutions, Study Guides, Notes 100% verified Guarantee .

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions