WGU Master's Course C701 - Ethical Hacking
(Practice Exam 124 Questions and answers)Latest
2022
Because attackers break into systems for various reasons, it is
important for information security professionals to understand
how malicious hackers exploit systems and the probable reasons
behind the attacks.
A True
B False - --ANSWER---A
Information security refers to ________ or ________
information and information systems that use, store, and
transmit information from unauthorized access, disclosure,
alteration, and destruction.
A compiling / securing
B imaging / shielding
,C duplicating / saving
D protecting / safeguarding - --ANSWER---D
Information is not the critical asset that organizations need to
secure.
A False
B True - --ANSWER---A
________ is the part of a malware or an exploit that performs
the intended malicious actions, which can include creating
backdoor access to a victim's machine, damaging or deleting
files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - --ANSWER---A
In a ________, the attacker exploits vulnerabilities in a
computer application before the software developer can release a
patch for them.
,A payload
B zero-day attack
C hack value
D vulnerability - --ANSWER---B
Information security is defined as "a state of well-being of
information and infrastructure in which the possibility of theft,
tampering, and disruption of information and services is kept
low and tolerable."
A False
B True - --ANSWER---B
Information security relies on four major elements:
confidentiality, integrity, availability, and authenticity.
A True
B False - --ANSWER---B
________ is the assurance that the information is accessible only
to those authorized to have access.
, A Availability
B Confidentiality
C Authenticity
D Integrity - --ANSWER---B
Confidentiality controls include data classification, data
encryption, and proper equipment disposal.
A False
B True - --ANSWER---B
________ is trustworthiness of data or resources in the
prevention of improper and unauthorized changes—the
assurance that information is sufficiently accurate for its
purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - --ANSWER---D
(Practice Exam 124 Questions and answers)Latest
2022
Because attackers break into systems for various reasons, it is
important for information security professionals to understand
how malicious hackers exploit systems and the probable reasons
behind the attacks.
A True
B False - --ANSWER---A
Information security refers to ________ or ________
information and information systems that use, store, and
transmit information from unauthorized access, disclosure,
alteration, and destruction.
A compiling / securing
B imaging / shielding
,C duplicating / saving
D protecting / safeguarding - --ANSWER---D
Information is not the critical asset that organizations need to
secure.
A False
B True - --ANSWER---A
________ is the part of a malware or an exploit that performs
the intended malicious actions, which can include creating
backdoor access to a victim's machine, damaging or deleting
files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - --ANSWER---A
In a ________, the attacker exploits vulnerabilities in a
computer application before the software developer can release a
patch for them.
,A payload
B zero-day attack
C hack value
D vulnerability - --ANSWER---B
Information security is defined as "a state of well-being of
information and infrastructure in which the possibility of theft,
tampering, and disruption of information and services is kept
low and tolerable."
A False
B True - --ANSWER---B
Information security relies on four major elements:
confidentiality, integrity, availability, and authenticity.
A True
B False - --ANSWER---B
________ is the assurance that the information is accessible only
to those authorized to have access.
, A Availability
B Confidentiality
C Authenticity
D Integrity - --ANSWER---B
Confidentiality controls include data classification, data
encryption, and proper equipment disposal.
A False
B True - --ANSWER---B
________ is trustworthiness of data or resources in the
prevention of improper and unauthorized changes—the
assurance that information is sufficiently accurate for its
purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - --ANSWER---D