WGU C836/D430 FUNDAMENTALS OF INFORMATION SECURITY EXAM 2024, PRACTICE EXAM TEST BANK AND STUDY
1 view 0 purchase
Course
WGU C836/D430
Institution
WGU C836/D430
WGU C836/D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM 2024,
PRACTICE EXAM TEST BANK AND
STUDY
. Definition of Information Security
Question 1: What is the primary goal of information security? A) To
prevent all cyber attacks
B) To protect the confidentiality, integrity, and availabilit...
WGU C836/D430 FUNDAMENTALS OF
INFORMATION SECURITY EXAM 2024,
PRACTICE EXAM TEST BANK AND
STUDY
. Definition of Information Security
Question 1: What is the primary goal of information security? A) To
prevent all cyber attacks
B) To protect the confidentiality, integrity, and availability of data
C) To ensure compliance with regulations
D) To reduce IT costs
Answer: B) To protect the confidentiality, integrity, and availability of
data
2. CIA Triad
Question 2: The CIA triad in information security stands for: A)
Confidentiality, Integrity, Availability
B) Control, Integrity, Accountability
C) Compliance, Integrity, Authentication
D) Confidentiality, Investigation, Accessibility
Answer: A) Confidentiality, Integrity, Availability
,3. Risk Management
Question 3: What is the first step in the risk management process? A)
Risk assessment
B) Risk mitigation
C) Risk identification
D) Risk transfer
Answer: C) Risk identification
4. Access Control
Question 4: Which of the following is a method of access control? A)
Data encryption
B) Multi-factor authentication
C) Backup procedures
D) Firewall settings
Answer: B) Multi-factor authentication
5. Encryption
Question 5: What is the purpose of encryption in information security?
A) To speed up data processing
B) To protect data from unauthorized access
C) To improve system performance
D) To ensure data integrity
Answer: B) To protect data from unauthorized access
6. Phishing Attacks
, Question 6: Phishing attacks primarily aim to: A) Steal hardware
B) Access sensitive information through deception
C) Disrupt network services
D) Encrypt data for ransom
Answer: B) Access sensitive information through deception
7. Firewalls
Question 7: What is the primary function of a firewall? A) To monitor
network performance
B) To block unauthorized access to or from a private network
C) To provide data backup
D) To encrypt data
Answer: B) To block unauthorized access to or from a private network
8. Malware Types
Question 8: Which type of malware is designed to replicate itself and
spread to other devices? A) Trojan
B) Virus
C) Ransomware
D) Spyware
Answer: B) Virus
9. Social Engineering
Question 9: Social engineering involves: A) Manipulating individuals
into revealing confidential information
B) Hacking into secure systems
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller joycewanjiku0036. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.