WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM,
PRACTICE EXAM TEST BANK AND STUDY GUIDE LATEST 2025 ACTUAL EXAM
WITH COMPLETE QUESTIONS AND CORRECT DETAILED ANSWERS (100%
VERIFIED ANSWERS) |ALREADY GRADED A+| ||PROFESSOR VERIFIED||
Something that has the potential to cause harm to our assets is
known as a(n) ________.
A Impact
B Risk
C Vulnerability
D Threat - ANSWER-D
What is the first and arguably one of the most important steps of
the risk management process?
A Assess risks
B Identify assets
C Assess vulnerabilities
D Identify threats
E Mitigate risks - ANSWER-B
,2|Page
The Interception attack type most commonly affects which
principle(s) of the CIA triad?
A Integrity and Availability
B Confidentiality and Integrity
C Availability
D Integrity
E Confidentiality - ANSWER-E
The Fabrication attack type most commonly affects which
principle(s) of the CIA triad?
A Availability
B Integrity
C Confidentiality
D Integrity and Availability
E Confidentiality and Integrity - ANSWER-D
,3|Page
Controls that protect the systems, networks, and environments
that process, transmit, and store our data are called _______.
A Physical controls
B Logical controls
C Administrative controls - ANSWER-B
During what phase of the incident response process do we
determine what happened, why it happened, and what we can do
to keep it from happening again?
A Containment
B Detection and Analysis
C Preparation
D Post-incident Activity
E Recovery - ANSWER-D
, 4|Page
The biometric characteristic that measures how well a factor
resists change over time and with advancing age is called
__________.
A Collectability
B Acceptability
C Universality
D Uniqueness
E Permanence - ANSWER-E
What type of authentication can prevent a man-in-the-middle
attack?
A Something you know
B Something you are
C Something you do
D Multifactor
E Mutual - ANSWER-E