100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C836/D430 Fundamentals of Information Security 2025 | 140+ Verified Practice Questions with Correct Answers and Rationales | Complete Study Guide for Cybersecurity Awareness, Risk Management, and IT Security Best Practices

Beoordeling
-
Verkocht
-
Pagina's
35
Cijfer
A+
Geüpload op
21-07-2025
Geschreven in
2024/2025

WGU C836/D430 Fundamentals of Information Security 2025 | 140+ Verified Practice Questions with Correct Answers and Rationales | Complete Study Guide for Cybersecurity Awareness, Risk Management, and IT Security Best Practices

Instelling
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY
Vak
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY
Vak
WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY

Documentinformatie

Geüpload op
21 juli 2025
Aantal pagina's
35
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

WGU C836/D430 Fundamentals of Information Security 2025 |
140+ Verified Practice Questions with Correct Answers and
Rationales | Complete Study Guide for Cybersecurity
Awareness, Risk Management, and IT Security Best Practices
QUESTION 1:
What is the primary goal of information security?

A) To increase profits
B) To protect information from unauthorized access and alteration
C) To promote technology
D) To enhance customer service

Correct Option: B) To protect information from unauthorized access and alteration
Rationale: The main objective is to safeguard data integrity, confidentiality, and availability.



QUESTION 2:
Which of the following is a key principle of information security?

A) Profit maximization
B) Confidentiality, Integrity, Availability (CIA)
C) Enhanced user experience
D) Data redundancy

Correct Option: B) Confidentiality, Integrity, Availability (CIA)
Rationale: CIA is the foundational model for information security.



QUESTION 3:
What does the term "threat" refer to in information security?

A) A system vulnerability
B) Any potential danger that could exploit a vulnerability
C) A method of protection
D) An active attack

Correct Option: B) Any potential danger that could exploit a vulnerability
Rationale: Threats can lead to security breaches if not managed properly.



QUESTION 4:
Which of the following is a common type of malware?

A) Firewall
B) Virus
C) Encryption
D) VPN

Correct Option: B) Virus
Rationale: Viruses are a type of malware designed to replicate and spread.

,QUESTION 5:
What is the purpose of a firewall?

A) To encrypt data
B) To monitor and control incoming and outgoing network traffic
C) To store sensitive information
D) To enhance performance

Correct Option: B) To monitor and control incoming and outgoing network traffic
Rationale: Firewalls act as a barrier between trusted and untrusted networks.



QUESTION 6:
What does "social engineering" refer to in the context of information security?

A) A technical exploit
B) Manipulating individuals into divulging confidential information
C) A method of encryption
D) A type of firewall

Correct Option: B) Manipulating individuals into divulging confidential information
Rationale: Social engineering exploits human psychology rather than technical vulnerabilities.



QUESTION 7:
Which of the following is an example of a physical security control?

A) Antivirus software
B) Security guards
C) Encryption
D) Firewalls

Correct Option: B) Security guards
Rationale: Physical security controls protect physical assets and facilities.



QUESTION 8:
What is the primary function of encryption in information security?

A) To backup data
B) To protect data confidentiality
C) To enhance system performance
D) To monitor user activity

Correct Option: B) To protect data confidentiality
Rationale: Encryption ensures that data remains unreadable to unauthorized users.



QUESTION 9:
What does the term "vulnerability" mean in the context of information security?

,A) A security control
B) A weakness in a system that can be exploited
C) A threat actor
D) A type of malware

Correct Option: B) A weakness in a system that can be exploited
Rationale: Vulnerabilities can be targets for attacks if not properly addressed.



QUESTION 10:
Which type of attack involves overwhelming a system with traffic?

A) Phishing
B) Denial of Service (DoS)
C) Man-in-the-middle
D) SQL Injection

Correct Option: B) Denial of Service (DoS)
Rationale: DoS attacks aim to make a service unavailable by overwhelming it.



QUESTION 11:
What is the purpose of multi-factor authentication (MFA)?

A) To simplify user access
B) To enhance security by requiring multiple forms of verification
C) To reduce password complexity
D) To store user credentials

Correct Option: B) To enhance security by requiring multiple forms of verification
Rationale: MFA adds layers of security to the authentication process.



QUESTION 12:
What is an intrusion detection system (IDS) used for?

A) To prevent attacks
B) To monitor and analyze network traffic for signs of malicious activity
C) To encrypt data
D) To control access

Correct Option: B) To monitor and analyze network traffic for signs of malicious activity
Rationale: IDS helps identify potential security breaches in real time.



QUESTION 13:
What does "data integrity" refer to in information security?

A) Data availability
B) The accuracy and consistency of data over its lifecycle

, C) Data confidentiality
D) Data redundancy

Correct Option: B) The accuracy and consistency of data over its lifecycle
Rationale: Maintaining data integrity ensures trustworthiness of information.



QUESTION 14:
Which of the following is a best practice for password security?

A) Using the same password for multiple accounts
B) Using a mix of letters, numbers, and symbols
C) Changing passwords every few years
D) Writing passwords down

Correct Option: B) Using a mix of letters, numbers, and symbols
Rationale: Strong, complex passwords are harder to crack.



QUESTION 15:
What role does a Security Information and Event Management (SIEM) system play?

A) Data backup
B) Centralizes monitoring and analysis of security events
C) User authentication
D) Malware removal

Correct Option: B) Centralizes monitoring and analysis of security events
Rationale: SIEM systems help in identifying and responding to security incidents.



QUESTION 16:
What is "phishing"?

A) A method of securing data
B) An attempt to trick individuals into revealing sensitive information
C) A type of firewall
D) A network monitoring technique

Correct Option: B) An attempt to trick individuals into revealing sensitive information
Rationale: Phishing typically involves deceptive emails or messages.



QUESTION 17:
Which of the following is an example of a technical control?

A) Security policies
B) Encryption software
C) Employee training
D) Physical barriers

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
brightonmunene Wgu
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
903
Lid sinds
6 maanden
Aantal volgers
6
Documenten
1582
Laatst verkocht
2 dagen geleden
Brighton Academic Hub

Welcome to Brighton Lighton’s academic store — your trusted source for high-quality, well-organized study materials designed to help you excel. Each document is immediately available after purchase in both online and downloadable PDF formats, with no restrictions. All files are carefully prepared and regularly updated to ensure accuracy, relevance, and ease of understanding. If you encounter any issue accessing a file after payment, feel free to contact me directly and I will personally send you the document promptly. Your satisfaction and academic success are my top priority.

Lees meer Lees minder
3,8

18 beoordelingen

5
10
4
2
3
2
2
1
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen