100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+)

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
07-02-2024
Written in
2023/2024

WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+) A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. A False B True - ANSWER B Question 4 :Which type of attack involves sending a large number of connection or information requests to a target? A denial-of-service (DoS) B brute force C spear fishing D malicious code - ANSWER A "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. A False B True - ANSWER A WGU Course C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+ Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? A controlling B leading C organization D planning - ANSWER C The macro virus infects the key operating system files located in a computer's start up sector. A True B False - ANSWER B A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A distributed denial-of-service B virus C spam D denial-of-service - ANSWER A Blackmail threat of informational disclosure is an example of which threat category? A Information extortion B Espionage or trespass C Compromises of intellectual property D Sabotage or vandalism - ANSWER A "4-1-9" fraud is an example of a ____________________ attack. A virus B social engineering C spam D worm - ANSWER B The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? A authorization B accountability C authentication D identification - ANSWER C One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A hacktivist B cyberhack C hackcyber D phreak - ANSWER A As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. A false alarms B urban legends C hoaxes D polymorphisms - ANSWER C Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A security B trespass C theft D bypass - ANSWER B The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. A False B True - ANSWER A Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? A people B projects C policy D protection - ANSWER A Which of the following is NOT a step in the problem-solving process? A Analyze and compare possible solutions B Build support among management for the candidate solution C Gather facts and make assumptions D Select, implement and evaluate a solution - ANSWER B Which of the following is NOT a primary function of Information Security Management? A projects B performance C planning D protection - ANSWER B Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. A threats B education C hugs D paperwork - ANSWER B Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing EMAIL ME: EMAIL ME: D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 7, 2024
Number of pages
36
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYROOM2024 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
397
Member since
2 year
Number of followers
212
Documents
3947
Last sold
2 weeks ago

For all Nursing Test Banks visit my page. All Papers are Verified and Graded to Score A++ Wish you Success.

3.5

59 reviews

5
19
4
14
3
13
2
4
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions