personal d430 (Actual Exam) Questions with verified Answers (Latest Update 2026) UPDATE!!

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:17 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

15 Terms

1
New cards

Which technology is considered private key cryptography?

Symmetric (private key)

2
New cards

A user runs an application that has been infected with malware that is less than 24 hours old. The malware then infects the operating system. Which safeguard should be implemented to prevent this type of attack?

Limit user account privileges.

3
New cards

Some malware hides itself by replacing some system administrator commands on a server, but the server continues to function normally for its users. Which component of the CIA triad has been compromised?

Integrity

4
New cards

An organization employs a VPN to safeguard its information. Which security principle is protected by a VPN?

Data in Motion

5
New cards

A user runs an application that has been infected with malware. This malware then performs a brute force attack on the built-in administrator account on Windows systems. The malware successfully cracks the password, and is used to compromise other systems in the environment. Which safeguard should be implemented to prevent this type of attack?

Modify the default user accounts.

6
New cards

Which security tool can evaluate web applications for cross-site scripting (XSS) vulnerabilities on a Linux web server?

Nikto

7
New cards

The network at a secure facility is entirely wired, and company policy bans the use of wireless connections. It is suspected that a rogue access point has been set up, providing unauthorized wireless access.Which cybersecurity tool should be used to detect whether the suspected rogue access point exists?

Kismet

8
New cards

Which tool should an application developer use to help identify input validation vulnerabilities?

A fuzzer

9
New cards

In addition to a username and corresponding password, a desktop application asks users to submit a special code. This code is produced by an application running on the users’ mobile phone. Which authentication technique is the phone application providing?

Something you have

10
New cards

Which component of the CIA triad is impacted if an attacker runs a sniffer?

Confidentiality

11
New cards

Which category of attack violates integrity by corrupting a hard drive?

Interruption

12
New cards

Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?

RSA

13
New cards

An IT department manager is concerned that data being sent across the internet from the homes of remote employees is viewable by unauthorized users. To address this, the IT department implements virtual private networks (VPNs) using Internet Security Protocol (IPSec). Which category of data is protected by the IT department's use of an IPSec VPN?

Data in motion

14
New cards

A company has just completed an audit of disaster protection strategies. The company has decided it must keep and be able to retrieve backup data for a period of 30 years. The company has implemented tape backups using 8mm digital audio tapes. Which factor could impact the company’s ability to access information from the backup tapes?

Technical obsolescence

15
New cards

A bank website accepts online loan applications. It requires applicants to review and sign a disclosure document explaining the organization’s information sharing practices. Which federal law protects consumer’s financial information?

GLBA