WGUC843 Exam Questions With Verified Answers | Latest version Graded A+ | 2023/2024
WGUC843 Exam Questions With Verified Answers | Latest version Graded A+ | 2023/2024. One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A hacktivist B cyberhack C hackcyber D phreak - ANSWER A As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. A false alarms B urban legends C hoaxes D polymorphisms - ANSWER C Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A security B trespass C theft D bypass - ANSWER B The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. A False B True - ANSWER A Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? A people B projects C policy D protection - ANSWER A Which of the following is NOT a step in the problem-solving process? A Analyze and compare possible solutions B Build support among management for the candidate solution C Gather facts and make assumptions D Select, implement and evaluate a solution - ANSWER B Which of the following is NOT a primary function of Information Security Management? A projects B performance C planning D protection - ANSWER B Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. A threats B education C hugs D paperwork - ANSWER B Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process. A True B False - ANSWER B One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. A False B True - ANSWER A What do audit logs that track user activity on an information system provide? A accountability B authentication C identification D authorization - ANSWER A A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. A False B True - ANSWER A Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? A Integrity B Availability C Authentication D Confidentiality - ANSWER D According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? A availability B authorization C authentication D accountability - ANSWER A ____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. A Spam B Worms C Viruses D Trojan horses - ANSWER D In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A sniff-in-the-middle B server-in-the-middle C man-in-the-middle D zombie-in-the-middle - ANSWER C A short-term interruption in electrical power availability is known as a ____. A blackout B lag C fault D brownout - ANSWER C The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. A False B True - ANSWER B Communications security involves the protection of which of the following?.
Written for
- Institution
-
Western Governors University
- Course
-
WGU C843 (WGUC843)
Document information
- Uploaded on
- July 7, 2023
- Number of pages
- 37
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- wgu c843
- wgu course c843
-
wguc843 exam questions with verified answers
-
wguc843 exam latest graded a | 20232024