WGU D430 Fundamentals of Information
Security Exam (Latest 2025/ 2026 Update)
Questions and Verified Answers| 100%
Correct| Grade A
Define the confidentiality in the CIA triad. - ANSWER Our
ability to protect data from those who are not authorized to view it.
Examples of confidentiality - ANSWER A patron using an
ATM card wants to keep their PIN number confidential.
An ATM owner wants to keep bank account numbers confidential.
How can confidentiality be broken? - ANSWER Losing a
laptop
An attacker gets access to info
A person can look over your shoulder
Define integrity in the CIA triad. - ANSWER The ability to
prevent people from changing your data and the ability to reverse unwanted
changes.
How do you control integrity? - ANSWER Permissions
restrict what users can do (read, write, etc.)
, Examples of integrity - ANSWER Data used by a doctor to
make medical decisions needs to be correct or the patient can die.
Define the availability in the CIA triad. - ANSWER Our data
needs to be accessible when we need it.
How can availability be broken? - ANSWER Loss of power,
application problems. If caused by an attacker, this is a Denial of Service attack.
Define information security. - ANSWER The protection of
information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
Define the Parkerian Hexad and its principles. - ANSWER
The Parkerian Hexad includes confidentiality, integrity, and availability from the
CIA triad. It also includes possession (or control), authenticity, and utility.
Authenticity - ANSWER Whether the data in question comes
from who or where it says it comes from (i.e. did this person actually send this
email?)
Confidentiality is affected by what type of attack? - ANSWER
Interception (eaves dropping)
Security Exam (Latest 2025/ 2026 Update)
Questions and Verified Answers| 100%
Correct| Grade A
Define the confidentiality in the CIA triad. - ANSWER Our
ability to protect data from those who are not authorized to view it.
Examples of confidentiality - ANSWER A patron using an
ATM card wants to keep their PIN number confidential.
An ATM owner wants to keep bank account numbers confidential.
How can confidentiality be broken? - ANSWER Losing a
laptop
An attacker gets access to info
A person can look over your shoulder
Define integrity in the CIA triad. - ANSWER The ability to
prevent people from changing your data and the ability to reverse unwanted
changes.
How do you control integrity? - ANSWER Permissions
restrict what users can do (read, write, etc.)
, Examples of integrity - ANSWER Data used by a doctor to
make medical decisions needs to be correct or the patient can die.
Define the availability in the CIA triad. - ANSWER Our data
needs to be accessible when we need it.
How can availability be broken? - ANSWER Loss of power,
application problems. If caused by an attacker, this is a Denial of Service attack.
Define information security. - ANSWER The protection of
information and information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction in order to provide confidentiality,
integrity, and availability.
Define the Parkerian Hexad and its principles. - ANSWER
The Parkerian Hexad includes confidentiality, integrity, and availability from the
CIA triad. It also includes possession (or control), authenticity, and utility.
Authenticity - ANSWER Whether the data in question comes
from who or where it says it comes from (i.e. did this person actually send this
email?)
Confidentiality is affected by what type of attack? - ANSWER
Interception (eaves dropping)