WGU C182 Introduction To IT | Actual
Exam With Answers
Information Technology - correct-answer -The technology used in creating,
maintaining, and making information accessible.
IT Professional Roles - correct-answer -Administration and Support
System Administrator - correct-answer -Maintains all aspects of the system
including hardware, software, and programming.
Network Administrator - correct-answer -In charge of all aspects of the computer
network
Database Administrator - correct-answer -Focuses on the design, development,
and support of database management systems (DBMSs).
,2|Page
Security Administrator - correct-answer -Installs, configures, and administers
firewall security to protect systems and proactively work to stop intrusions.
Web Administrator - correct-answer -Installs, configures, maintains, secures, and
troubleshoots web severs.
Support IT Professionals - correct-answer -Help desk and training.
Information - correct-answer -Processed data.
Strategic Risk Analysis - correct-answer -1. Identify the organization's information
assets
2. Identify vulnerabilities of each asset
3. Determine threats
4. Prioritizing risks
5. Develop and enact policies that will reduce threats
,3|Page
Information Security Classifications - correct-answer -Public - available through
public sources; includes names and addresses
Sensitive - not considered a threat to a person's privacy if others learn of it;
include email addresses
Private - information that could be a threat if disclosed to others; includes social
security and credit card numbers
Confidential - information that an organization will keep secret; includes
patentable information and business plans
Defense in Depth - correct-answer -Protecting every layer that surrounds data
Phishing - correct-answer -Emails to people to redirect them to a website to
perform some operation but the website is a fake and just takes the information
SQL Injection - correct-answer -An attacker issues a SQL command to a web server
as part of the URL or as input to a form on a company's website; web server might
pass the command onto the database which then allows potentially anything to
be done to the database
, 4|Page
Buffer Overflow - correct-answer -Placing malicious code into the buffer so that it
can be executed once stored in memory; oldest and most well known software
exploit; software engineers can protect against this when writing code
Hacking - correct-answer -When an individual obtains unauthorized access to a
host
White Hat Hacker - correct-answer -Informs companies of potential problems with
software so companies can fix
Black Hat Hacker - correct-answer -Individuals with malicious intent who violate
security in order to commit crimes or acts of terrorism
Grey Hat Hacker - correct-answer -Engage in both white and black hat types of
hacking activities
Packet Sniffing - correct-answer -Allows you to obtain anything being sent over a
network if the data being transmitted isn't encrypted