1
WGU Master's Course C701 - Ethical Hacking EXAM
(TESTING REAL EXAM QUESTIONS) AND VERIFIED
ANSWERS (MULTIPLE CHOICES) |A+ GRADED |100%
CORRECT!!
Because attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A True
B False - ...(ANSWERS)....A
Information security refers to ________ or ________ information and information
systems that use, store, and transmit information from unauthorized access,
disclosure, alteration, and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - ...(ANSWERS)....D
Information is not the critical asset that organizations need to secure.
A False
B True - ...(ANSWERS)....A
, 2
________ is the part of a malware or an exploit that performs the intended
malicious actions, which can include creating backdoor access to a victim's
machine, damaging or deleting files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - ...(ANSWERS)....A
In a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A payload
B zero-day attack
C hack value
D vulnerability - ...(ANSWERS)....B
Information security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A False
, 3
B True - ...(ANSWERS)....B
Information security relies on four major elements: confidentiality, integrity,
availability, and authenticity.
A True
B False - ...(ANSWERS)....B
________ is the assurance that the information is accessible only to those
authorized to have access.
A Availability
B Confidentiality
C Authenticity
D Integrity - ...(ANSWERS)....B
Confidentiality controls include data classification, data encryption, and proper
equipment disposal.
A False
B True - ...(ANSWERS)....B
, 4
________ is trustworthiness of data or resources in the prevention of improper
and unauthorized changes—the assurance that information is sufficiently
accurate for its purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - ...(ANSWERS)....D
Measures to maintain data integrity may include a checksum and access control.
A False
B True - ...(ANSWERS)....B
________ is the assurance that the systems responsible for delivering, storing,
and processing information are accessible when required by authorized users.
A Integrity
B Confidentiality
C Availability
D Authenticity - ...(ANSWERS)....C
WGU Master's Course C701 - Ethical Hacking EXAM
(TESTING REAL EXAM QUESTIONS) AND VERIFIED
ANSWERS (MULTIPLE CHOICES) |A+ GRADED |100%
CORRECT!!
Because attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A True
B False - ...(ANSWERS)....A
Information security refers to ________ or ________ information and information
systems that use, store, and transmit information from unauthorized access,
disclosure, alteration, and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - ...(ANSWERS)....D
Information is not the critical asset that organizations need to secure.
A False
B True - ...(ANSWERS)....A
, 2
________ is the part of a malware or an exploit that performs the intended
malicious actions, which can include creating backdoor access to a victim's
machine, damaging or deleting files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - ...(ANSWERS)....A
In a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A payload
B zero-day attack
C hack value
D vulnerability - ...(ANSWERS)....B
Information security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A False
, 3
B True - ...(ANSWERS)....B
Information security relies on four major elements: confidentiality, integrity,
availability, and authenticity.
A True
B False - ...(ANSWERS)....B
________ is the assurance that the information is accessible only to those
authorized to have access.
A Availability
B Confidentiality
C Authenticity
D Integrity - ...(ANSWERS)....B
Confidentiality controls include data classification, data encryption, and proper
equipment disposal.
A False
B True - ...(ANSWERS)....B
, 4
________ is trustworthiness of data or resources in the prevention of improper
and unauthorized changes—the assurance that information is sufficiently
accurate for its purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - ...(ANSWERS)....D
Measures to maintain data integrity may include a checksum and access control.
A False
B True - ...(ANSWERS)....B
________ is the assurance that the systems responsible for delivering, storing,
and processing information are accessible when required by authorized users.
A Integrity
B Confidentiality
C Availability
D Authenticity - ...(ANSWERS)....C