Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D430 Fundamentals of Information Security - Comprehensive Study Notes & Final Exam Review Guide (2026/2026)

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
09-03-2026
Written in
2025/2026

WGU D430 Fundamentals of Information Security - Comprehensive Study Notes & Final Exam Review Guide (2026/2026) __________ is used for port scanning, discovering devices, and searching for hosts on a network. It is an important tool to help identify and remove unessential services when hardening an operating system. Nmap What is reduced by hardening an operating system correct answer The attack surface Hardening the operating system is a way to mitigate various threats and vulnerabilities, thus, reducing ____________________________. The attack surface What is used to prevent buffer overflow correct answer Bounds checking __________________ sets a limit on the amount of data an application takes in. Bounds checking _____________________ is a type of attack where more data is entered into an application from a particular input than expected. Buffer overflow _____________________ occurs when input is checked for accuracy and validity. Input validation Which type of vulnerability is present when multiple threads within a process control access to a particular resource correct answer Race condition ___________________ is a security risk in places where data might be exposed, such as free wireless internet networks. Wireless exposure A ________________________ occurs when multiple threads within a process control access to a particular resource and the correct handling depends on timing or transactions. Race condition __________________ is an attack that uses SQL code for backend database manipulation to access information. SQL injection __________________ is an attack that routes DNS requests to the attacker's server, providing attackers a covert command and control channel, and data exfiltration path. DNS tunneling Which type of attack occurs when certain print functions within a programming language are used to manipulate and view the internal memory of an application correct answer Format string _________________________ is an attack in which an attacker injects malicious executable scripts into the code of a trusted application or website. Cross-site scripting

Show more Read less
Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Content preview

WGU D430 Fundamentals of Information Security -
Comprehensive Study Notes & Final Exam Review Guide
(2026/2026)

__________ is used for port scanning, discovering devices, and searching for hosts on
a network. It is an important tool to help identify and remove unessential services when
hardening an operating system.
Nmap



What is reduced by hardening an operating system correct answer
The attack surface



Hardening the operating system is a way to mitigate various threats and vulnerabilities,
thus, reducing ____________________________.
The attack surface



What is used to prevent buffer overflow correct answer
Bounds checking



__________________ sets a limit on the amount of data an application takes in.
Bounds checking



_____________________ is a type of attack where more data is entered into an
application from a particular input than expected.
Buffer overflow



_____________________ occurs when input is checked for accuracy and validity.
Input validation

,Which type of vulnerability is present when multiple threads within a process control
access to a particular resource correct answer
Race condition



___________________ is a security risk in places where data might be exposed, such
as free wireless internet networks.
Wireless exposure



A ________________________ occurs when multiple threads within a process control
access to a particular resource and the correct handling depends on timing or
transactions.
Race condition



__________________ is an attack that uses SQL code for backend database
manipulation to access information.
SQL injection



__________________ is an attack that routes DNS requests to the attacker's server,
providing attackers a covert command and control channel, and data exfiltration path.
DNS tunneling



Which type of attack occurs when certain print functions within a programming language
are used to manipulate and view the internal memory of an application correct answer
Format string



_________________________ is an attack in which an attacker injects malicious
executable scripts into the code of a trusted application or website.
Cross-site scripting



A ____________ attack is a type of authentication attack that occurs when a program is
implemented to automate the process of guessing valid usernames and password
combinations.

,Brute force



_____________________ attacks occur when homegrown algorithms are used as
cryptographic controls or when application keys are not changed, as these practices
result in exposing our systems to attackers.
Cryptographic



Which type of attack is an example of an input validation attack correct answer
Format string



An organization is seeking to implement a solution that unifies control of all devices from
a central location. Which solution should the organization implement correct answer
Mobile device management (MDM)



An _____________________ refers to any system that controls in industrial process
and is commonly embedded in devices.
Industrial control system



A __________________________ solution refers to a set of tools and features that
allow an organization to centrally manage its devices under a single system. P 155
Mobile device management (MDM)



_____________________ refers to a computer contained inside another device that
typically performs a single function.
Embedded security



A __________________ is an underlying system that runs on its own processor and
generally handle's the devices' hardware. P 156
Baseband OS

, What should a company do to prevent jailbreaking on a mobile device correct answer
Attach an external management solution



_____________________________________________ to a mobile device can stop
jailbreaking, as it installs its own apps to provide additional security layers on the
device.
Attaching an external management solution



While ________________________ can make it easier for an organization to centrally
manage devices, it will not prevent jailbreaking.
Disabling personal email



While _________________________ apps on a mobile device can make it easier for an
organization to centrally manage devices, it will not prevent jailbreaking.
Disabling file sharing



While ____________________ frequent updates will provide protection on a mobile
device, hackers can still find a way to jailbreak the device.
Installing updates



Which assessment tool scans for vulnerabilities on a host correct answer
Nessus



What describes an authorized attempt to gain unauthorized access to a computer
system or network correct answer
Ethical hacking



The practice of covertly discovering and collecting information about a system.
Reconnaissance

Written for

Institution
WGU D430 / WGU C836 Information Security
Course
WGU D430 / WGU C836 Information Security

Document information

Uploaded on
March 9, 2026
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$12.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
KieranKent55 NONE
Follow You need to be logged in order to follow users or courses
Sold
43
Member since
2 year
Number of followers
18
Documents
6452
Last sold
3 months ago

3.6

9 reviews

5
4
4
1
3
2
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions