100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU D430 Fundamentals of Information Security OA Actual Exam 2026 | Questions with Verified Answers | 100% Correct | Pass Guaranteed

Puntuación
-
Vendido
-
Páginas
22
Grado
A+
Subido en
06-01-2026
Escrito en
2025/2026

WGU D430 Fundamentals of Information Security OA Actual Exam 2026 | Questions with Verified Answers | 100% Correct | Pass Guaranteed

Institución
WGU D430 Fundamentals Of Information Security
Grado
WGU D430 Fundamentals of Information Security










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU D430 Fundamentals of Information Security
Grado
WGU D430 Fundamentals of Information Security

Información del documento

Subido en
6 de enero de 2026
Número de páginas
22
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU D430 Fundamentals of Information Security OA
Actual Exam 2026 | Questions with Verified Answers |
100% Correct | Pass Guaranteed

SECTION 1: Security Concepts & Governance

Q1: Which objective of the CIA Triad ensures that data has not been altered or destroyed in an
unauthorized manner?
A. Confidentiality

B. Integrity

C. Availability

D. Non-repudiation

Correct Answer: B

Rationale: Integrity guarantees that information remains accurate and unaltered unless modified
by authorized users; this is typically enforced through hashing, digital signatures, and version
controls. Confidentiality (A) focuses on preventing unauthorized disclosure, while Availability
(C) ensures timely access to data. Non-repudiation (D) provides undeniable proof of an action
but is not part of the classic CIA triad.

Q2: A hospital must comply with a U.S. regulation that mandates administrative, physical, and
technical safeguards for Protected Health Information (PHI). Which standard/law is applicable?
A. HIPAA

B. SOX

C. GLBA

D. FERPA

,Correct Answer: A

Rationale: The Health Insurance Portability & Accountability Act (HIPAA) Security Rule
requires covered entities to implement specific safeguards for PHI. SOX (B) governs corporate
financial reporting, GLBA (C) addresses consumer financial data held by banks, and FERPA (D)
protects student education records—none of which focus on health data.

Q3: During a risk assessment, a manager rates a threat as "high" because it could exploit a
vulnerability once per month and potentially cost $100k in lost sales. Which risk methodology
step does this represent?
A. Risk identification

B. Risk likelihood & impact analysis

C. Risk mitigation

D. Risk acceptance

Correct Answer: B

Rationale: Estimating how often a threat may occur (likelihood) and the monetary or operational
damage it could cause (impact) defines qualitative/quantitative risk analysis. Identification (A)
catalogs assets, threats, and vulnerabilities; mitigation (C) selects controls; acceptance (D) is a
management decision to live with the risk.

Q4: Which document provides senior leadership's written commitment to information security,
assigns responsibilities, and aligns security with business objectives?
A. Procedure

B. Guideline

C. Information Security Policy

D. Standard

Correct Answer: C

, Rationale: A policy is a high-level, mandatory statement that reflects management's intent and
sets the security tone across the organization. Procedures (A) are step-by-step instructions,
guidelines (B) are recommendations, and standards (D) specify minimum requirements for
hardware, software, or configurations.

Q5: A control that restores critical systems within 4 hours after a disruption and fully recovers
operations within 24 hours is best described as which type of control?
A. Preventive

B. Deterrent

C. Corrective

D. Detective

Correct Answer: C

Rationale: Corrective controls reduce the impact of an incident and restore operations (e.g.,
business continuity plans, backups). Preventive (A) blocks incidents, deterrent (B) discourages
violations, and detective (D) identifies occurrences after the fact.

Q6: A company adopts the NIST Cybersecurity Framework. After identifying and protecting
assets, which function comes next in the continuous cycle?
A. Recover

B. Detect

C. Respond

D. Govern

Correct Answer: B

Rationale: The NIST CSF sequence is Identify → Protect → Detect → Respond → Recover.
"Detect" encompasses monitoring and anomaly detection. Recover (A) is the final phase;
Respond (C) follows Detect; Govern (D) is a cross-cutting activity, not a sequential function.
$15.69
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
TommyRicks

Conoce al vendedor

Seller avatar
TommyRicks Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
1 mes
Número de seguidores
0
Documentos
480
Última venta
2 días hace
TommyRicks

One stop shop for all all study materials, Study guides,Exams and all assignments and homeworks.

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes