ACTUAL EXAM WITH COMPLETE 240 QUESTIONS AND
CORRECT DETAILED ANSWERS (VERIFIED ANSWERS)
ALREADY GRADED
A+ / WGU D430 FUNDAMENTALS OF INFORMATION SECURITY
EXAM OA AND PA | GUARANTEED PASS | WGU 2025
A database is vulnerable to sql injection attacks through direct attempts to the
database server or through applications software, including web applications.
What is the most effective way of mitigating these attacks?
A authenticating the user on the server-side
B authenticating the user on the client-side
C validating user inputs
D turning on database logging
E keeping the software patched - answer- c
Validating user inputs
What is information security?
A protecting information and information systems from unauthorized trust,
use, disclosure, disruption, modification, or destruction.
B protecting information and information systems from unauthorized access, use,
degradation, disruption, modification, or destruction.
,C protecting information and information systems from unauthorized access,
use, disclosure, displacement, modification, or destruction.
D protecting information and information systems from unauthorized access,
use, disclosure, disruption, modification, or destruction.
Protecting information and information systems from unauthorized access, use,
disclosure, disruption, modification, or destruction.
What security strategy best protects an operating system from buffer overflow
attacks?
A apply software updates
B implement executable space protection
C install a host intrusion detection system
D implement anti-malware tools
Implement executable space protection
A bank website accepts online loan applications. It requires applicants to
review and sign a disclosure document explaining the organization's
information sharing practices.
Which federal law protects consumer's financial information?
,A sox
B glba
C ferpa
D hipaa
Glba
The total of the available avenues through which our operating system might
be attacked is called a(n) .
A risk area
B vulnerability surface
C security hole
D attack surface
E avenue field
Avenue field
Small bits of software that take advantage of flaws in other software or
applications to cause them to behave in ways that were not intended by their
creators are called .
A intruders
B exploits
, C fuzzers
D vulnerabilities
E scanners
Exploits
Which software development vulnerability occurs when multiple processes
control or share access to a particular resource, and the
correct handling of that resource depends on the proper ordering or timing of
transactions?
A authentication attacks
B input validation attacks
C race conditions
D buffer overflows
E authorization attacks
Race conditions
Which microsoft fuzzing tool examines source code for general good practices?
A minifuzz file fuzzer
B binscope binary analyzer