WGU D430 EXAM 2026| ALL QUESTIONS AND CORRECT ANSWERS | NEWEST EXAM | GRADED A+ | VERIFIED ANSWERS | WESTERN GOVERNORS UNIVERSITY

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/154

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:20 PM on 4/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

155 Terms

1
New cards

A new start-up company has started working on a social networking website. The company has moved all its source code to a cloud provider and wants to protect this source code from unauthorized access.

Which cyber defense concept should the start-up company use to maintain the confidentiality of its source code?

File encryption

2
New cards

A company has an annual audit of installed software and data storage systems. During the audit, the auditor asks how the company's most critical data is used. This determination helps the auditor ensure that the proper defense mechanisms are in place to protect critical data.

Which cybersecurity term is defined as the potential for an attack on a resource?

Threat

3
New cards

Which security type deliberately exposes a system's vulnerabilities or resources to an attacker?

Honeypots

4
New cards

Which tool can be used to map devices on a network, along with their operating system types and versions?

Port scanner

5
New cards

Which web attack is a server-side attack?

SQL injection

6
New cards

An organization employs a VPN to safeguard its information.

Which security principle is protected by a VPN?

Data in motion

7
New cards

A malicious hacker was successful in a denial of service (DoS) attack against an institution's mail server. Fortunately, no data was lost or altered while the server was offline.

Which type of attack is this?

Interruption

8
New cards

A company has had several successful denial of service (DoS) attacks on its email server.

Which principle of the Parkerian hexad is the auditor addressing?

Utility

9
New cards

Which web attack is possible due to a lack of input validation?

SQL injection

10
New cards

Which file action implements the principle of confidentiality from the CIA triad?

Encryption

11
New cards

Which cyber defense concept suggests limiting permissions to only what is necessary to perform a particular task?

Principle of least privilege

12
New cards

A company institutes a new policy that "All office computer monitors must face toward employees and must face away from doorways. The monitor screens must not be visible to people visiting the office."

Which principle of the CIA triad is this company applying?

Confidentiality

13
New cards

At a small company, an employee makes an unauthorized data alteration. Which component of the CIA triad has been compromised?

Integrity

14
New cards

An organization plans to encrypt data in transit on a network.

Which aspect of data is the organization attempting to protect?

Integrity

15
New cards

Which aspect of the CIA triad is violated by an unauthorized database rollback or undo?

Integrity

16
New cards

A company's website has suffered several denial of service (DoS) attacks and wishes to thwart future attacks.

Which security principle is the company addressing?

Availability

17
New cards

An organization has a requirement that all database servers and file servers be configured to maintain operations in the presence of a failure.

Which principle of the CIA triad is this requirement implementing?

Availability

18
New cards

A company's IT policy manual states that "All company computers, workstations, application servers, and mobile devices must have current versions of antivirus software."

Which principle or concept of cybersecurity does this policy statement impact?

Operating system security

19
New cards

An organization's procedures document states that "All electronic communications should be encrypted during transmission across networks using encryption standards specified in the data encryption policy."

Which security principle is this policy addressing?

Confidentiality

20
New cards

An organization notices unauthorized visitors following employees through a restricted doorway.

Which vulnerability should be addressed in the organization's security policy?

Tailgating

21
New cards

A company wants to update its access control policy. The company wants to prevent hourly employees from logging in to company computers after business hours.

Attribute-based

22
New cards

A new software development company has determined that one of its proprietary algorithms is at a high risk for unauthorized disclosure. The company's security up to this point has been fairly lax.

Which procedure should the company implement to protect this asset?

Relocate the algorithm to encrypted storage.

23
New cards

An accounting firm stores financial data for many customers. The company policy requires that employees only access data for customers they are assigned to. The company implements a written policy indicating an employee can be fired for violating this requirement.

Which type of control has the company implemented?

Deterrent

24
New cards

How can an operating system be hardened in accordance to the principle of least privilege?

Restrict account permissions.

25
New cards

A company implements an Internet-facing web server for its sales force to review product information. The sales force can also update its profiles and profile photos, but not the product information. There is no other information on this server.

Which content access permissions should be granted to the sales force based on the principle of least privilege?

Read and limited write access

26
New cards

A corporation has discovered that some confidential personnel information has been used inappropriately.

How can the principle of least privilege be applied to limit access to confidential personnel records?

Only allow access to those who need access to perform their job.

27
New cards

A user runs an application that has been infected with malware that is less than 24 hours old. The malware then infects the operating system.

Which safeguard should be implemented to prevent this type of attack?

Limit user account privileges

28
New cards

A company was the victim of a security breach resulting in stolen user credentials. An attacker used a stolen username and password to log in to an employee email account.

Which security practice could have reduced the post-breach impact of this event?

Multi-factor authentication

29
New cards

A module in a security awareness course shows a user making use of two-factor authentication using a hardware token.

Which security failure is being addressed by this training module?

Weak passwords

30
New cards

Which tool should an application developer use to help identify input validation vulnerabilities?

fuzzer

31
New cards

A systems administrator enables operating system logging to capture unsuccessful log in attempts.

Which attack can be uncovered by reviewing such logs?

Brute force

32
New cards

A student downloads free software from a website and this software includes some malware.

Which tool can locate this vulnerability?

Antivirus software

33
New cards

Which type of tool can be used to detect vulnerabilities in source code related to improper handling of user input?

Fuzzer

34
New cards

A petroleum company has a group of computers used to monitor flow of materials in the refining process. These computers are never connected to the Internet or other corporate network, and they host proprietary monitoring software which the company has registered as a trade secret.

Which type of security will be able to help protect its software against theft?

Physical

35
New cards

An organization wants to minimize the impact of user credential theft by ensuring that only HR staff can access employee personal information.

Which security mechanism should it implement?

Apply the principle of least privilege.

36
New cards

An organization wants to prevent malware from infecting its workstations, mobile devices, and web applications.

Which security tool should it implement?

Antivirus

37
New cards

A small IT firm is required to authenticate remote customers who access the firm's network.

Which protection technique should the IT firm employ to satisfy this requirement?

File encryption

38
New cards

A company has files stored on a server that are critical to the organization's viability. The administrator has assigned the appropriate permissions to the files.

How should the administrator provide additional confidentiality protection for the files at rest?

File encryption

39
New cards

Which security solution can an organization deploy to prevent unauthorized external access to its internal network?

Firewall

40
New cards

A restaurant needs to protect its customers' credit card information. Which security standard should the restaurant follow?

PCI DSS

41
New cards

In addition to a username and corresponding password, a desktop application asks users to submit a special code. This code is produced by an application running on the users' mobile phone.

Which authentication technique is the phone application providing?

Something you have

42
New cards

Employees are required to swipe their access cards and then to use an iris scanner to access protected areas in the company's data center.

Which two authentication techniques are used to protect the data center?

Something you have and something you are

43
New cards

Which resource is the health company directly trying to protect?

Data

44
New cards

A file is stored in a marketing folder and is accessible only to members of the marketing group. An attacker uses a phishing scam to gain the credentials of a user who is a member of the marketing group, and then reads the file.

Which leg of the CIA triad is being targeted?

Confidentiality

45
New cards

An attacker performs a buffer overflow attack on an organization's web server. The web server locks up and must be restarted to restore functionality.

Which part of the CIA triad is under attack?

Availability

46
New cards

Some malware hides itself by replacing some system administrator commands on a server, but the server continues to function normally for its users.

Which component of the CIA triad has been compromised?

Integrity

47
New cards

Which component of the CIA triad will be impacted if an attacker cuts network cables?

Availability

48
New cards

A bank wants to ensure user interactions with the online banking website are confidential.

Which security solution should be implemented?

SSL/TLS

49
New cards

What is an example of symmetric key encryption?

AES

50
New cards

Which asymmetric cryptographic algorithm can provide confidentiality for data in motion?

RSA

51
New cards

A company has just completed an audit of disaster protection strategies. The company has decided it must keep and be able to retrieve backup data for a period of 30 years. The company has implemented tape backups using 8mm digital audio tapes.

Which factor could impact the company's ability to access information from the backup tapes?

Technical obsolescence

52
New cards

A military installation is evaluating backup solutions for its critical data. This installation operates in a harsh environment that is subjected to heat, humidity, and magnetic fields.

Which physical media should be selected to ensure the integrity of backups is preserved given these harsh operating conditions?

Flash drives

53
New cards

A university research group wants to collect data on animals that are native to southern Arizona, which is a hot, dry region. They plan to camp in tents for the summer at the edge of a national park and to use optical media to backup photos and research notes.

Which physical or environmental factor may damage their optical media?

Temperature

54
New cards

In the system room of a small company, an emergency power shut-down switch was installed right next to a light switch. As a result, employees sometimes shut down the power accidentally when they leave the data center.

Which type of control should be implemented to mitigate the risk of accidental shut down?

Physical

55
New cards

A company developing and distributing open source applications realizes that attackers are copying the publicly available, open source code and inserting malware into the code.

Which type of cryptographic tool should the company use to protect the integrity of its open source applications?

Hash functions

56
New cards

After considerable research, attackers directed a spear phishing attack at employees at a single bank. One employee opened a message, resulting in a breach that delivered ransomware.

Which type of control should be implemented to prevent future spear phishing attacks?

Employee training

57
New cards

A company has instituted a policy to prevent data leakage. The policy requires that any data stored on USB storage devices must be encrypted with at least 256-bit encryption.

Which principle that is part of the Parkerian hexad but not the CIA triad would be violated if one of these devices was stolen?

Possession

58
New cards

A company is concerned about potential phishing attacks through email. As a result, a new company policy dictates that all email must be digitally signed before it is sent to any customers or partners.

Which security principle that is part of Parkerian hexad but not part of the CIA triad is precipitating this policy change?

Authenticity

59
New cards

Which two principles of the CIA triad can be violated by a fabrication attack?

Integrity and availability

60
New cards

Which two principles of the CIA triad can be violated by an interruption attack?

Integrity and availability

61
New cards

Which attack category targets the confidentiality of data?

Interception

62
New cards

A bank website accepts online loan applications. It requires applicants to review and sign a disclosure document explaining the organization's information sharing practices.

Which federal law protects consumer's financial information?

GLBA

63
New cards

A retail store has hired a third party to audit its computer and network systems that process credit card payments.

Which industry standard is the retail store addressing?

PCI DSS

64
New cards

In order to continue processing credit card payments, a retail store arranges for an external auditor to perform regular external and internal vulnerability scans.

Which regulation are they addressing?

PCI DSS

65
New cards

A hospital allows its patients to pay by credit card.

Which set of regulations apply to the hospital's operations?

HIPAA and PCI DSS

66
New cards

While visiting a country in the European Union, an American purchases an expensive bottle of perfume with a credit card.

What does the European Union Directive 95/46/EC regulation safeguard for the purchaser?

Personally identifiable information

67
New cards

Which U.S. law defines security standards exclusively for federal agencies?

FISMA

68
New cards

Which U.S. law regulates the confidentiality and accuracy of a publicly traded corporation's financial reports?

SOX

69
New cards

Something that has the potential to cause harm to our assets is known as a(n) ________.

Threat

70
New cards

What is the first and arguably one of the most important steps of the risk management process?

Identify assets

71
New cards

The Interception attack type most commonly affects which principle(s) of the CIA triad?

Confidentiality

72
New cards

Controls that protect the systems, networks, and environments that process, transmit, and store our data are called _______.

Logical controls

73
New cards

The Fabrication attack type most commonly affects which principle(s) of the CIA triad?

Integrity and Availability

74
New cards

During what phase of the incident response process do we determine what happened, why it happened, and what we can do to keep it from happening again?

Post-incident Activity

75
New cards

The biometric characteristic that measures how well a factor resists change over time and with advancing age is called __________.

Permanence

76
New cards

A badge or token is considered what type of authentication?

Something you have

77
New cards

The set of methods we use to establish a claim of identity as being true is called ______.

Authentication

78
New cards

A fingerprint is considered what type of authentication?

Something you are

79
New cards

A password or PIN is considered what type of authentication?

Something you know

80
New cards

What type of access control can prevent the confused deputy problem?

Capability-based security

81
New cards

A user who creates a network share and sets permissions on that share is employing which model of access control?

Discretionary access control

82
New cards

A client-side attack that involves the attacker placing an invisible layer over something on a website that the user would normally click on, in order to execute a command differing from what the user thinks they are performing, is known as ___________.

Clickjacking

83
New cards

A VPN connection that is set to time out after 24 hours is demonstrating which model of access control?

Attribute-based access control

84
New cards

Confidential Services Inc. is a military-support branch consisting of 1,400 computers with Internet access and 250 servers. All employees are required to have security clearances. From the options listed below, what access control model would be most appropriate for this organization?

Mandatory access control

85
New cards

Nessus is an example of a(n) _______________ tool.

Vulnerability scanning

86
New cards

Your organization's network was recently the target of an attack. Fortunately, the new system you installed took action and refused traffic from the source before you even had a chance to respond. What system did you install?

An authentication system

87
New cards

A surveillance video log contains a record, including the exact date and time, of an individual gaining access to his company's office building after hours. He denies that he was there during that time, but the existence of the video log proves otherwise. What benefit of accountability does this example demonstrate?

Nonrepudiation

88
New cards

What process ensures compliance with applicable laws, policies, and other bodies of administrative control, and detects misuse?

Auditing

89
New cards

___________ provides us with the means to trace activities in our environment back to their source.

Accountability

90
New cards

Backordered Parts is a defense contractor that builds communications parts for the military. The employees use mostly Web-based applications for parts design and information sharing. Due to the sensitive nature of the business, Backordered Parts would like to implement a solution that secures all browser connections to the Web servers. What encryption solution best meets this company's needs?

Elliptic Curve Cryptography (ECC)

91
New cards

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company is concerned that a wily, computer-savvy competitor will send e-mail messages pretending to be from Shovels and Shingles to its customers, in an attempt to gather customer information. What encryption solution best prevents a competitor from successfully impersonating the company?

Digital signatures

92
New cards

The science of breaking through encryption is known as _____.

Cryptanalysis

93
New cards

We are somewhat limited in our ability to protect which type of data?

Data in use

94
New cards

Some standards are not mandated by law but are managed and enforced by the industry, often via a council or committee. Which of the options below is an example of this industry compliance?

E GLBA - ANSWER- B

95
New cards

______ sets limits on the use and disclosure of patient information and grants individuals rights over their own health records.

HIPAA

96
New cards

______ ensures the protection of information, operations, and assets in federal government.

FISMA

97
New cards

______ protects the privacy of students and their parents.

FERPA

98
New cards

______ regulates the financial practice and governance of corporations.

Sox

99
New cards

______ protects the customers of financial institutions.

GLBA

100
New cards

During what phase of the operations security process do we match threats and vulnerabilities?

Assessment of risks