WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+)
WGU C843 Managing Information Security Final Exam Questions and Answers Updated 2024/2025 (GRADED A+) A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. A False B True - ANSWER B Question 4 :Which type of attack involves sending a large number of connection or information requests to a target? A denial-of-service (DoS) B brute force C spear fishing D malicious code - ANSWER A "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. A False B True - ANSWER A WGU Course C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+ Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? A controlling B leading C organization D planning - ANSWER C The macro virus infects the key operating system files located in a computer's start up sector. A True B False - ANSWER B A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A distributed denial-of-service B virus C spam D denial-of-service - ANSWER A Blackmail threat of informational disclosure is an example of which threat category? A Information extortion B Espionage or trespass C Compromises of intellectual property D Sabotage or vandalism - ANSWER A "4-1-9" fraud is an example of a ____________________ attack. A virus B social engineering C spam D worm - ANSWER B The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? A authorization B accountability C authentication D identification - ANSWER C One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A hacktivist B cyberhack C hackcyber D phreak - ANSWER A As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. A false alarms B urban legends C hoaxes D polymorphisms - ANSWER C Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A security B trespass C theft D bypass - ANSWER B The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. A False B True - ANSWER A Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? A people B projects C policy D protection - ANSWER A Which of the following is NOT a step in the problem-solving process? A Analyze and compare possible solutions B Build support among management for the candidate solution C Gather facts and make assumptions D Select, implement and evaluate a solution - ANSWER B Which of the following is NOT a primary function of Information Security Management? A projects B performance C planning D protection - ANSWER B Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. A threats B education C hugs D paperwork - ANSWER B Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing EMAIL ME: EMAIL ME: D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process
Written for
- Institution
-
Western Governors University
- Course
-
WGU C843 (C843)
Document information
- Uploaded on
- February 7, 2024
- Number of pages
- 36
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- c843
- wgu c843
- updated 2024
- 2025
- verified answers
-
wgu c843 managing information security
-
wgu c843 final exam questions and answers