D430 - Q&A - Fundamentals of Information Security (Actual Exam) Questions with verified Answers (Latest Update 2026) UPDATE!!-WGU

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/280

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:20 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

281 Terms

1
New cards

Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______.

Logical Controls

2
New cards

During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again?

Post-Incident Activity

3
New cards

Something that has the potential to cause harm to our assets is known as a(n) ________.

Threat

4
New cards

What is the first and arguably one of the most important steps of the risk management process?

Identify assess

5
New cards

The Fabrication attack type most commonly affects which principle(s) of the CIA triad?

Integrity and Availability

6
New cards

The Interception attack type most commonly affects which principle(s) of the CIA triad?

Confidentiality

7
New cards

A badge or token is considered what type of authentication?

Something you have

8
New cards

A password or PIN is considered what type of authentication?

Something you know

9
New cards

The set of methods we use to establish a claim of identity as being true is called ______.

Authentication

10
New cards

A fingerprint is considered what type of authentication?

Something you are

11
New cards

What type of authentication can prevent a man-in-the-middle attack?

Mutual

12
New cards

The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________

Permanence

13
New cards

What dictates that we should only allow the bare minimum of access, as needed?

Principle of least privilege

14
New cards

Access controls are policies or procedures used to control access to certain items.

True

15
New cards

What is implemented through the use of access controls?

Authorization

16
New cards

Which answer best describes the authorization component of access control?

Authorization is the process of determining who is approved for access and what resources they are approved for.

17
New cards

A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________.

Clickjacking

18
New cards

What type of access control can prevent the confused deputy problem?

Capability-based security

19
New cards

A user who creates a network share and sets permissions on that share is employing which model of access control?

Discretionary access control

20
New cards

A VPN connection that is set to time out after 24 hours is demonstrating which model of access control?

Attribute-based access control

21
New cards

Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization?

Mandatory access control

22
New cards

What is information security?

Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.

23
New cards

Using the concept of defense in depth we can protect ourselves against someone using a USB flash drive to remove confidential data from an office space within our building.

True

24
New cards

Select the example(s) of identity verification. (Choose all that apply.)

SSN

Passport

Birth certificate

25
New cards

Multifactor authentication is the use of more than one authentication method to access an information system.

True

26
New cards

Which password below would meet complexity standards?

!Q@S#z6ge7Uks1lw3

27
New cards

What is accountability comprised of?

Authorization

Authentication

Identification

Access

28
New cards

What document do courts require for admissibility of records?

Chain of custody

29
New cards

An employee is charged with fraud, and the company can prove in court that there are email transactions showing that the employee completed these using a digital signature. What term is being described?

Nonrepudiation

30
New cards

What is auditing?

The primary means to ensure accountability through technical means

31
New cards

What are the two common forms of assessments performed on networks? (Choose all that apply.)

Penetration test

Vulnerability assessment

32
New cards

_______ provides us with the means to trace activities in our environment back to their source.

Accountability

33
New cards

Nessus is an example of a(n) _______________ tool.

Vulnerability scanning

34
New cards

A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate?

Non repudiation

35
New cards

What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse?

Auditing

36
New cards

Your organization's network was recently the target of an attack. Fortunately, the new system you installed took action and refused traffic from the source before you even had a chance to respond. What system did you install?

An intrusion prevention system

37
New cards

The act of scrambling plain text into cyphertext is known as ________.

encryption

38
New cards

A strong hash function is designed so that a message cannot be forged that will result in the same hash as a legitimate message.

True

39
New cards

An encryption cipher that uses the same key to encrypt and decrypt is called a/an ______.

asymmetric key

40
New cards

Hashes provide confidentiality and integrity.

False

41
New cards

An algorithm used for cryptographic purposes is known as a _______.

cipher

42
New cards

__________ corroborates the identity of an entity, whether it is the sender, the sender's computer, some device, or some information.

Authentication

43
New cards

The science of breaking through encryption is known as _____.

Cryptanalysis

44
New cards

Hashes provide _______, but not _______.

Integrity, confidentiality

45
New cards

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company is concerned that a wily, computer-savvy competitor will send e-mail messages pretending to be from Shovels and Shingles to its customers, in an attempt to gather customer information. What encryption solution best prevents a competitor from successfully impersonating the company?

Digital signatures

46
New cards

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs?

Elliptic Curve Cryptography (ECC)

47
New cards

We are somewhat limited in our ability to protect which type of data?

Data in use

48
New cards

A cybersecurity professional must be proficient with all current laws, both state and federal, that may apply to the organization he or she works with.

False

49
New cards

FISMA refers to ____.

Federal Information Security Management Act of 2002 and Federal Information Security Modernization Act of 2014

50
New cards

Which statement below is true about a company operating in the United States today?

International computing laws must be considered if any customer resides outside the U.S.

51
New cards

PII is personally identifiable information. This data must always _____.

be monitored for compliance

52
New cards

______ ensures the protection of information, operations, and assets in federal government.

FISMA

53
New cards

______ protects the privacy of students and their parents.

FERPA

54
New cards

______ sets limits on the use and disclosure of patient information and grants individuals rights over their own health records.

HIPAA

55
New cards

______ regulates the financial practice and governance of corporations.

SOX

56
New cards

______ protects the customers of financial institutions.

GLBA

57
New cards

Some standards are not mandated by law but are managed and enforced by the industry, often via a council or committee. Which of the options below is an example of this industry compliance?

PCI DSS

58
New cards

A formal methodology of operations security is _____.

OPENSEC

59
New cards

Risk can be higher when ___________ services are used for computing operations.

cloud computing

60
New cards

During what phase of the operations security process do we match threats and vulnerabilities?

Assessment of risks

61
New cards

Haas' second law of operations security, "If you don't know what to protect, how do you know you are protecting it?," maps to what step in the operations security process?

Identification of critical information

62
New cards

The process of intelligence gathering and analysis to support business decisions is known as _______.

Competitive intelligence

63
New cards

The study that was conducted to discover the cause of the information leak during the Vietnam War was codenamed ________ and is now considered a symbol of OPSEC.

Purple Dragon

64
New cards

You are leaving for an extended vacation and want to take steps to protect your home. You set a timer to turn lights and the TV on and off at various times throughout the day, suspend the mail delivery, and arrange for a neighbor to come in and water the plants. What step in the operations security process do these actions demonstrate?

Application of countermeasures

65
New cards

Choose all the answers that improve training efforts towards achieving a user's authentic change of behaviors and better security habits.

Communicate security awareness in varied and repeated ways.

Implement gamification techniques in the required CBT course.

66
New cards

Which of the options below is an example of an effective Security Awareness, Training, and Education (SATE) strategy?

A daily "security check" question that, if answered correctly, enters the user into a giveaway

67
New cards

Which social engineering technique involves impersonating someone else to convince the target to perform some action that they wouldn't normally do for a stranger?

Pretexting

68
New cards

You swipe your key card to gain access to a secure area of the building. As you pass through the door, you notice someone right behind you. You don't recall that he was walking behind you a moment ago, nor do you see a key card in his hand. What social engineering technique is demonstrated in this example?

Tailgating

69
New cards

Your IT department has implemented a comprehensive defense in depth strategy to protect your company resources. The buildings are protected by key card swipes and video surveillance, logins and passwords are required for access to any digital resource, and your network and workstation equipment is properly configured, patched, and protected. Policies are in place to recover from any major security risk. What single entity can invalidate all of these efforts?

A person

70
New cards

Which of the following is not a best practice for password security?

Teaching users how to manually sync passwords between systems

71
New cards

Security guards and guard dogs are a part of which type(s) of physical security controls?

Preventive

Deterrent

Detective

72
New cards

Which storage media is least sensitive to temperature, humidity, magnetic fields, and impacts?

Flash media

73
New cards

Deterrent, detective, and preventive security controls, when used in isolation, are not a complete solution. To have a stronger, more complete solution, we need to use _____.

defense in depth

74
New cards

Your company has an office full of expensive computer equipment to protect. You recommend a variety of approaches, including a security guard stationed at the entrance, a high fence around the property, and key card entry to all nonpublic areas. What security concept are you recommending to protect your company's assets?

Defense in depth

75
New cards

What planning process ensures that critical business functions can continue to operate during an emergency?

Business continuity planning

76
New cards

You work for a small company that has just upgraded its data servers. The new servers are up and running, and normal operations have resumed. The company plans to sell its old equipment. What is your primary concern before they auction off the old hardware

Residual data

77
New cards

What planning process ensures that we can respond appropriately during and after a disaster?

Disaster recovery planning

78
New cards

Which of the options below demonstrates all three types of physical security controls: deterrent, detective, and preventive?

A guard dog

79
New cards

A way to keep our network traffic content from being logged by our ISP is _____.

VPN

80
New cards

The toolset a corporation might use to centrally manage all cellular phones provided to its employees is _____.

MDM

81
New cards

Tcpdump

This command-line packet sniffing tool runs on Linux and UNIX operating systems.

82
New cards

Kismet

A tool used to detect unauthorized wireless access points

83
New cards

Hping3

A tool used to test the security of firewalls.

84
New cards

Nmap

A versatile tool able to scan ports, search for hosts on the network, and other operations.

85
New cards

Wireshark

A graphical interface protocol analyzer capable of filtering, sorting, and analyzing both wired and wireless network traffic

86
New cards

_____________ is a sniffer that specializes in detecting wireless devices.

Kismet

87
New cards

A firewall that can watch packets and monitor the traffic from a given connection is using what kind of firewall technology?

Stateful packet inspection

88
New cards

A tool that deliberately displays vulnerabilities in an attempt to bait attackers is called _____________.

a honeypot

89
New cards

A specialized type of firewall that provides security and performance features, functions as a choke point, allows for logging traffic for later inspection, and serves as a single source of requests for the devices behind it is known as a(n) ____________.

Proxy server

90
New cards

_____________ is a popular, fully-featured sniffer capable of intercepting traffic from a wide variety of wired and wireless sources.

Wireshark

91
New cards

Executable space protection is a software technology implemented by operating systems to stop attacks using the same techniques used in malware.

False

92
New cards

This type of host-based software may communicate with the management device by sending regular beacons.

HIDS

93
New cards

Vulnerability Assessment Tools

Nessus

94
New cards

Scanner

Nmap

95
New cards

Exploit Framework

Metasploit

CANVAS

96
New cards

The total of the available avenues through which our operating system might be attacked is called a(n) ________.

Attack surface

97
New cards

Which tool is a well-known vulnerability assessment tool that also includes a port scanner?

Nessus

98
New cards

Which well-known tool is a scanner with a large and broad set of functionality?

Nmap

99
New cards

What security strategy best protects an operating system from buffer overflow attacks?

Implement executable space protection

100
New cards

Small bits of software that take advantage of flaws in other software or applications to cause them to behave in ways that were not intended by their creators are called _____ .

Exploits