WGU D430 QUESTIONS AND
ANSWERS WITH VERIFIED
SOLUTIONS 100% CORRECT!!!
LATEST UPDATED 2025
D430 Quiz Questions 1
, lOMoARcPSD| 54339004
Which of the following is NOT a security principle?
A. Confidentiality
B. Integrity
C. Availability
D. Efficiency
Answer: D
Explanation: The three security principles are confidentiality, integrity, and availability (Andress, 2019,
What is the primary goal of cyber defense?
A. To prevent unauthorized access to systems and data
B. To maximize system efficiency
C. To improve system performance
D. To reduce maintenance costs
Answer: A
Explanation: The primary goal of cyber defense is to prevent unauthorized access to systems and data
(Andress, 2019, p. 15).
Which security principle is violated when a hacker gains unauthorized access to a system?
A. Confidentiality
B. Integrity
C. Availability
D. Efficiency
Answer: A
Explanation: When a hacker gains unauthorized access to a system, it violates the confidentiality security
principle (Andress, 2019, p. 11).
What is the purpose of a firewall?
A. To prevent unauthorized access to a network
B. To increase network speed
C. To detect and remove viruses
D. To encrypt network traffic
, lOMoARcPSD| 54339004
Answer: A
Explanation: The purpose of a firewall is to prevent unauthorized access to a network (Andress, 2019, p. 163).
What is a honeypot?
A. A vulnerable system designed to attract attackers
B. A tool for detecting network vulnerabilities
C. An encryption tool for securing data
D. A type of virus that spreads through a network
Answer: A
Explanation: A honeypot is a vulnerable system designed to attract attackers (Andress, 2019, p. 165).
What is the purpose of a vulnerability assessment tool like Nessus?
A. To identify and prioritize security vulnerabilities in a network
B. To encrypt network traffic
C. To prevent unauthorized access to a network
D. To monitor network traffic for security threats
Answer: A
Explanation: The purpose of a vulnerability assessment tool like Nessus is to identify and prioritize security
vulnerabilities in a network (Andress, 2019, p. 185).
Which of the following is a vulnerability assessment tool made by Rapid7?
A. Nessus
B. Metasploit
C. CANVAS
D. Nikto
Answer: B
Explanation: Metasploit is a vulnerability assessment tool made by Rapid7 (Andress, 2019, p. 186).
What is the purpose of a web server analysis tool like Nikto?
A. To identify and prioritize security vulnerabilities in a web server
B. To encrypt web server traffic
C. To prevent unauthorized access to a web server
, lOMoARcPSD| 54339004
D. To monitor web server traffic for security threats
Answer: A
Explanation: The purpose of a web server analysis tool like Nikto is to identify and prioritize security
vulnerabilities in a web server (Andress, 2019, p. 207).
What is the purpose of the FISMA framework?
A. To establish information security policies and procedures for federal agencies
B. To regulate the use of personal health information
C. To protect student educational records
D. To ensure the security of financial data
Answer: A
Explanation: The purpose of the FISMA framework is to establish information security policies and
procedures for federal agencies (Andress, 2019, p. 262).
Which of the following acts regulates the use of personal health information?
A. FISMA
B. HIPAA Accountability Act
C. FERPA Act
D. SOX
Answer: B
Explanation: The HIPAA Accountability Act regulates the use of personal health information (Andress, 2019,
p. 264).
What is the purpose of the FERPA Act?
A. To protect student educational records
B. To establish information security policies and procedures for federal agencies
C. To regulate the use of personal health information
D. To ensure the security of financial data
Answer: A
Explanation: The purpose of the FERPA Act is to protect student educational records (Andress, 2019, p. 264).
Which of the following is NOT a requirement of the GLBA?
ANSWERS WITH VERIFIED
SOLUTIONS 100% CORRECT!!!
LATEST UPDATED 2025
D430 Quiz Questions 1
, lOMoARcPSD| 54339004
Which of the following is NOT a security principle?
A. Confidentiality
B. Integrity
C. Availability
D. Efficiency
Answer: D
Explanation: The three security principles are confidentiality, integrity, and availability (Andress, 2019,
What is the primary goal of cyber defense?
A. To prevent unauthorized access to systems and data
B. To maximize system efficiency
C. To improve system performance
D. To reduce maintenance costs
Answer: A
Explanation: The primary goal of cyber defense is to prevent unauthorized access to systems and data
(Andress, 2019, p. 15).
Which security principle is violated when a hacker gains unauthorized access to a system?
A. Confidentiality
B. Integrity
C. Availability
D. Efficiency
Answer: A
Explanation: When a hacker gains unauthorized access to a system, it violates the confidentiality security
principle (Andress, 2019, p. 11).
What is the purpose of a firewall?
A. To prevent unauthorized access to a network
B. To increase network speed
C. To detect and remove viruses
D. To encrypt network traffic
, lOMoARcPSD| 54339004
Answer: A
Explanation: The purpose of a firewall is to prevent unauthorized access to a network (Andress, 2019, p. 163).
What is a honeypot?
A. A vulnerable system designed to attract attackers
B. A tool for detecting network vulnerabilities
C. An encryption tool for securing data
D. A type of virus that spreads through a network
Answer: A
Explanation: A honeypot is a vulnerable system designed to attract attackers (Andress, 2019, p. 165).
What is the purpose of a vulnerability assessment tool like Nessus?
A. To identify and prioritize security vulnerabilities in a network
B. To encrypt network traffic
C. To prevent unauthorized access to a network
D. To monitor network traffic for security threats
Answer: A
Explanation: The purpose of a vulnerability assessment tool like Nessus is to identify and prioritize security
vulnerabilities in a network (Andress, 2019, p. 185).
Which of the following is a vulnerability assessment tool made by Rapid7?
A. Nessus
B. Metasploit
C. CANVAS
D. Nikto
Answer: B
Explanation: Metasploit is a vulnerability assessment tool made by Rapid7 (Andress, 2019, p. 186).
What is the purpose of a web server analysis tool like Nikto?
A. To identify and prioritize security vulnerabilities in a web server
B. To encrypt web server traffic
C. To prevent unauthorized access to a web server
, lOMoARcPSD| 54339004
D. To monitor web server traffic for security threats
Answer: A
Explanation: The purpose of a web server analysis tool like Nikto is to identify and prioritize security
vulnerabilities in a web server (Andress, 2019, p. 207).
What is the purpose of the FISMA framework?
A. To establish information security policies and procedures for federal agencies
B. To regulate the use of personal health information
C. To protect student educational records
D. To ensure the security of financial data
Answer: A
Explanation: The purpose of the FISMA framework is to establish information security policies and
procedures for federal agencies (Andress, 2019, p. 262).
Which of the following acts regulates the use of personal health information?
A. FISMA
B. HIPAA Accountability Act
C. FERPA Act
D. SOX
Answer: B
Explanation: The HIPAA Accountability Act regulates the use of personal health information (Andress, 2019,
p. 264).
What is the purpose of the FERPA Act?
A. To protect student educational records
B. To establish information security policies and procedures for federal agencies
C. To regulate the use of personal health information
D. To ensure the security of financial data
Answer: A
Explanation: The purpose of the FERPA Act is to protect student educational records (Andress, 2019, p. 264).
Which of the following is NOT a requirement of the GLBA?