WGU D315 |PA|PRE- ASSESSMENT EXAM
QUESTIONS AND ANSWERS
Correct
Incorrect
, Don't know?
2 of 69
Term
An attacker uses a trojan horse to forward usernames and
passwords to an anonymous email address.What is the purpose of
the attack?
Give this one a try later!
data import data export
pharming social engineering
Don't know?
3 of 69
Term
An attacker uses a list of commonly used access credentials to
attempt to gain access to an online account.Which type of
cyberattack is described?
Give this one a try later!
dictionary attack rainbow table attack
, brute force attack hybrid attack
Don't know?
4 of 69
Term
A company is updating devices it provides employees to ensure that
employees has consistent network access. What is the CIA TRIAD
component targeted?
Give this one a try later!
Availability Authorization
Integrity Authenticity
Don't know?
, 5 of 69
Term
.
An organization is the victim of an attack in which an attacker uses
a program to take control of a connection by pretending to be
each end of the connection.What is the type of cyberattack
described in this scenario?
Give this one a try later!
sql injection dictionary attack
domain hijacking session hijacking
Don't know?
6 of 69
Term
Which layer of the TCP/IP model includes the Internet Message
Access Protocol (IMAP)?
Give this one a try later!
APPLICATION SESSION
QUESTIONS AND ANSWERS
Correct
Incorrect
, Don't know?
2 of 69
Term
An attacker uses a trojan horse to forward usernames and
passwords to an anonymous email address.What is the purpose of
the attack?
Give this one a try later!
data import data export
pharming social engineering
Don't know?
3 of 69
Term
An attacker uses a list of commonly used access credentials to
attempt to gain access to an online account.Which type of
cyberattack is described?
Give this one a try later!
dictionary attack rainbow table attack
, brute force attack hybrid attack
Don't know?
4 of 69
Term
A company is updating devices it provides employees to ensure that
employees has consistent network access. What is the CIA TRIAD
component targeted?
Give this one a try later!
Availability Authorization
Integrity Authenticity
Don't know?
, 5 of 69
Term
.
An organization is the victim of an attack in which an attacker uses
a program to take control of a connection by pretending to be
each end of the connection.What is the type of cyberattack
described in this scenario?
Give this one a try later!
sql injection dictionary attack
domain hijacking session hijacking
Don't know?
6 of 69
Term
Which layer of the TCP/IP model includes the Internet Message
Access Protocol (IMAP)?
Give this one a try later!
APPLICATION SESSION