100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

D430 Fundamentals of Information Security actual exam questions with 100% correct answers

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
20-12-2025
Written in
2025/2026

D430 Fundamentals of Information Security actual exam questions with 100% correct answers

Institution
Wgu
Course
Wgu










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
December 20, 2025
Number of pages
26
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

D430 Fundam en tals of Infor m ation Secur ity
actual exam questions w ith 100% cor r ect
answ er s + r ationales ( 2025 latest updated
ver sion )
Question 1: Which regulation mandates that financial
institutions explain their information-sharing practices
and safeguard customer data?
FERPA
GDPR
HIPAA
GLBA
Hide Answer
Correct! Well done!
Correct answer: GLBA
The Gramm-Leach-Bliley Act (GLBA) requires financial institutions
to explain how they share information and take steps to safeguard
customer data. It specifically addresses privacy and the security
of financial information.

,Question 2: Which law protects the privacy of student
educational records?
HIPAA
FERPA
SOX
HITECH
Hide Answer
Correct! Well done!
Correct answer: FERPA
The Family Educational Rights and Privacy Act (FERPA) protects
the privacy of student education records and grants certain rights
to parents and students regarding access to those records.
Question 3: Which cryptographic method uses two keys,
one public and one private, to secure communication?
Symmetric cryptography
Asymmetric cryptography
Hashing
Digital signature
Hide Answer
Correct! Well done!
Correct answer: Asymmetric cryptography
Asymmetric cryptography uses two keys, a public key for
encryption and a private key for decryption, providing secure
communication. One key is public, and the other is private,
offering more security compared to symmetric cryptography.

, Question 4: Which of the following security principles
ensures that data can only be accessed by authorized
individuals?
Integrity
Confidentiality
Availability
Utility
Hide Answer
Correct! Well done!
Correct answer: Confidentiality
Confidentiality ensures that data is only accessible to authorized
individuals, preventing unauthorized access or disclosure of
sensitive information.
Question 5: Which law provides a framework to protect
the security of government information and operations?
SOX
HIPAA
FISMA
FERPA
Hide Answer
Correct! Well done!
Correct answer: FISMA
The Federal Information Security Management Act (FISMA)
establishes a framework to ensure the effectiveness of
information security controls in federal government agencies.
Question 6: What are the three states of data in
information security?
$22.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
EXAMIQ

Get to know the seller

Seller avatar
EXAMIQ Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 weeks
Number of followers
0
Documents
371
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions