WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+
WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+. Which of the following is the first step in the problem-solving process? A Analyze and compare the possible solutions B Develop possible solutions C Recognize and define the problem D Select, implement and evaluate a solution - ANSWER C A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. A False B True - ANSWER B Question 4 :Which type of attack involves sending a large number of connection or information requests to a target? A denial-of-service (DoS) B brute force C spear fishing D malicious code - ANSWER A "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. A False B True - ANSWER A WGU Course C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+ Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? A controlling B leading C organization D planning - ANSWER C The macro virus infects the key operating system files located in a computer's start up sector. A True B False - ANSWER B A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A distributed denial-of-service B virus C spam D denial-of-service - ANSWER A Blackmail threat of informational disclosure is an example of which threat category? A Information extortion B Espionage or trespass C Compromises of intellectual property D Sabotage or vandalism - ANSWER A "4-1-9" fraud is an example of a ____________________ attack. A virus B social engineering C spam D worm - ANSWER B The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? A authorization B accountability C authentication D identification - ANSWER C One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A hacktivist B cyberhack C hackcyber D phreak - ANSWER A As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. A false alarms B urban legends C hoaxes D polymorphisms - ANSWER C Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A security B trespass C theft D bypass - ANSWER B The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. A False B True - ANSWER A Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? A people B projects C policy D protection - ANSWER A Which of the following is NOT a step in the problem-solving process? A Analyze and compare possible solutions B Build support among management for the candidate solution C Gather facts and make assumptions D Select, implement and evaluate a solution - ANSWER B Which of the following is NOT a primary function of Information Security Management? A projects B performance C planning D protection - ANSWER B Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. A threats B education C hugs D paperwork - ANSWER B Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing EMAIL ME: EMAIL ME: D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process. A True B False - ANSWER B EMAIL ME: EMAIL ME: One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. A False B True - ANSWER A What do audit logs that track user activity on an information system provide? A accountability B authentication C identification D authorization - ANSWER A A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. A False B True - ANSWER A Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? A Integrity B Availability C Authentication D Confidentiality - ANSWER D According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? EMAIL ME: EMAIL ME: A availability B authorization C authentication D accountability - ANSWER A ____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. A Spam B Worms C Viruses D Trojan horses - ANSWER D In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A sniff-in-the-middle B server-in-the-middle C man-in-the-middle D zombie-in-the-middle - ANSWER C A short-term interruption in electrical power availability is known as a ____. A blackout B lag C fault D EMAIL ME: brownout - ANSWER C The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. A False B True - ANSWER B Communications security involves the protection of which of the following?. A media, technology, and content
Written for
- Institution
-
Western Governors University
- Course
-
WGU C843 (WGUC843)
Document information
- Uploaded on
- January 31, 2024
- Number of pages
- 36
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- wgu course c843
- wgu c843
- c843
- latest updated 2024
- 2025
- graded
- verified
-
wgu c843 managing information security
-
c843 exam questions and answers