Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 Fundamentals of Information Security – Structured Study Summary & Assessment Prep Guide 2025/2026

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
09-03-2026
Written in
2025/2026

WGU D430 Fundamentals of Information Security – Structured Study Summary & Assessment Prep Guide 2025/2026 A security administrator is configuring rules on a firewall to block specific types of traffic based on the application layer information. What feature is being implemented correct answer Deep Packet Inspection An organization wants to protect its network from external threats and monitor and control internet usage. What technology should be implemented for this purpose correct answer Proxy Servers An organization wants to ensure that employees only have access to the information necessary for their roles. What principle should be implemented to achieve this correct answer Least Privilege A company is implementing a policy to define the acceptable use of organizational resources and information systems. What is this policy called correct answer Acceptable Use Policy An organization is implementing a policy to ensure that employees do not share their login credentials. What is this policy called correct answer Password Policy A company is implementing a practice to regularly review and update user access permissions. What is this practice called correct answer Access Review An organization wants to ensure that employees only have access to specific areas of a building based on their job responsibilities. What practice should be implemented correct answer Role-Based Access Control (RBAC) A security administrator is implementing a method to verify the identity of individuals accessing a system by using a combination of username and a one-time code sent to their mobile device. What method is being implemented correct answer Multi-Factor Authentication (MFA) An organization wants to ensure that employees can access multiple systems with a single set of credentials. What method should be implemented correct answer Single Sign-On (SSO) A company wants to implement a method where access permissions are automatically granted or revoked based on predefined rules and policies. What method is being described correct answer Attribute-Based Access Control (ABAC)

Show more Read less
Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Content preview

WGU D430 Fundamentals of Information Security –
Structured Study Summary & Assessment Prep Guide
2025/2026
A security administrator is configuring rules on a firewall to block specific types of traffic
based on the application layer information. What feature is being implemented correct
answer
Deep Packet Inspection



An organization wants to protect its network from external threats and monitor and
control internet usage. What technology should be implemented for this purpose
correct answer
Proxy Servers



An organization wants to ensure that employees only have access to the information
necessary for their roles. What principle should be implemented to achieve this correct
answer
Least Privilege



A company is implementing a policy to define the acceptable use of organizational
resources and information systems. What is this policy called correct answer
Acceptable Use Policy



An organization is implementing a policy to ensure that employees do not share their
login credentials. What is this policy called correct answer
Password Policy



A company is implementing a practice to regularly review and update user access
permissions. What is this practice called correct answer
Access Review

,An organization wants to ensure that employees only have access to specific areas of a
building based on their job responsibilities. What practice should be implemented
correct answer
Role-Based Access Control (RBAC)



A security administrator is implementing a method to verify the identity of individuals
accessing a system by using a combination of username and a one-time code sent to
their mobile device. What method is being implemented correct answer
Multi-Factor Authentication (MFA)



An organization wants to ensure that employees can access multiple systems with a
single set of credentials. What method should be implemented correct answer
Single Sign-On (SSO)



A company wants to implement a method where access permissions are automatically
granted or revoked based on predefined rules and policies. What method is being
described correct answer
Attribute-Based Access Control (ABAC)



An organization is implementing a policy to ensure that employees are only granted
access to specific systems necessary for their job roles. What is this policy called
correct answer
Least Privilege Policy



A security administrator is implementing a method to identify individuals based on their
physical characteristics, such as fingerprints or retina scans. What method is being
implemented correct answer
Biometric Authentication



A company is implementing a practice to regularly rotate and update user passwords to
enhance security. What is this practice called correct answer
Password Policy

, An organization is implementing a method where access permissions are assigned
based on specific job responsibilities. What method is being described correct answer
Role-Based Access Control (RBAC)



A security administrator is implementing a practice to regularly review and update user
roles and permissions. What is this practice called correct answer
Access Review



An organization is implementing a method where individuals are granted access based
on their need for specific information to perform their job functions. What method is
being described correct answer
Need-to-Know



A company is implementing a policy to ensure that employees with privileged access
undergo thorough background checks. What is this policy called correct answer
Background Check Policy



An organization is implementing a method where access permissions are based on the
specific tasks an individual performs within a job role. What method is being described
correct answer
Separation of Duties



A security administrator is implementing a practice to regularly audit and monitor user
activities to detect and prevent unauthorized access. What is this practice called
correct answer
Auditing



An organization wants to ensure that individuals with access to sensitive information
have undergone specific training on handling and protecting that information. What is
this policy called correct answer
Training and Awareness Policy

Written for

Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Document information

Uploaded on
March 9, 2026
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
KieranKent55 NONE
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
2 year
Number of followers
18
Documents
6452
Last sold
2 months ago

3.6

9 reviews

5
4
4
1
3
2
2
0
1
2

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions