100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
31-01-2024
Written in
2023/2024

WGU C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+. Which of the following is the first step in the problem-solving process? A Analyze and compare the possible solutions B Develop possible solutions C Recognize and define the problem D Select, implement and evaluate a solution - ANSWER C A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for pre-configured signatures. A False B True - ANSWER B Question 4 :Which type of attack involves sending a large number of connection or information requests to a target? A denial-of-service (DoS) B brute force C spear fishing D malicious code - ANSWER A "Shoulder spying" is used in public or semi-public settings when individuals gather information they are not authorized to have by looking over another individual's shoulder or viewing the information from a distance. A False B True - ANSWER A WGU Course C843 Managing Information Security, Exam Questions and Answers Latest Updated 2024/2025 GRADED A+ Which of the following is the principle of management dedicated to the structuring of resources to support the accomplishment of objectives? A controlling B leading C organization D planning - ANSWER C The macro virus infects the key operating system files located in a computer's start up sector. A True B False - ANSWER B A ____________________ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time. A distributed denial-of-service B virus C spam D denial-of-service - ANSWER A Blackmail threat of informational disclosure is an example of which threat category? A Information extortion B Espionage or trespass C Compromises of intellectual property D Sabotage or vandalism - ANSWER A "4-1-9" fraud is an example of a ____________________ attack. A virus B social engineering C spam D worm - ANSWER B The use of cryptographic certificates to establish Secure Sockets Layer (SSL) connections is an example of which process? A authorization B accountability C authentication D identification - ANSWER C One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency. A hacktivist B cyberhack C hackcyber D phreak - ANSWER A As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____________________. A false alarms B urban legends C hoaxes D polymorphisms - ANSWER C Acts of ____________________ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter. A security B trespass C theft D bypass - ANSWER B The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack. A False B True - ANSWER A Which function of InfoSec Management encompasses security personnel as well as aspects of the SETA program? A people B projects C policy D protection - ANSWER A Which of the following is NOT a step in the problem-solving process? A Analyze and compare possible solutions B Build support among management for the candidate solution C Gather facts and make assumptions D Select, implement and evaluate a solution - ANSWER B Which of the following is NOT a primary function of Information Security Management? A projects B performance C planning D protection - ANSWER B Human error or failure often can be prevented with training, ongoing awareness activities, and ____________________. A threats B education C hugs D paperwork - ANSWER B Which of the following is the principle of management that develops, creates, and implements strategies for the accomplishment of objectives? A leading B planning C organizing EMAIL ME: EMAIL ME: D controlling - ANSWER B Web hosting services are usually arranged with an agreement defining minimum service levels known as a(n) ____. A MIN B MSL C SLA D SSL - ANSWER C Which of the following is a feature left behind by system designers or maintenance staff that allows quick access to a system at a later time by bypassing access controls? A brute force B DoS C back door D hoax - ANSWER C The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. A True B False - ANSWER B The authorization process takes place before the authentication process. A True B False - ANSWER B EMAIL ME: EMAIL ME: One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with excessive quantities of e-mail. A False B True - ANSWER A What do audit logs that track user activity on an information system provide? A accountability B authentication C identification D authorization - ANSWER A A device (or a software program on a computer) that can monitor data traveling on a network is known as a socket sniffer. A False B True - ANSWER A Which of the following is a C.I.A. characteristic that ensures that only those with sufficient privileges and a demonstrated need may access certain information? A Integrity B Availability C Authentication D Confidentiality - ANSWER D According to the C.I.A. triad, which of the following is a desirable characteristic for computer security? EMAIL ME: EMAIL ME: A availability B authorization C authentication D accountability - ANSWER A ____________________ are malware programs that hide their true nature, and reveal their designed behavior only when activated. A Spam B Worms C Viruses D Trojan horses - ANSWER D In the ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network. A sniff-in-the-middle B server-in-the-middle C man-in-the-middle D zombie-in-the-middle - ANSWER C A short-term interruption in electrical power availability is known as a ____. A blackout B lag C fault D EMAIL ME: brownout - ANSWER C The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. A False B True - ANSWER B Communications security involves the protection of which of the following?. A media, technology, and content

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
January 31, 2024
Number of pages
36
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYLAB2023 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
777
Member since
3 year
Number of followers
624
Documents
5426
Last sold
5 days ago
STUDYLAB 2022/2023

Here you will find reliable study resources that will help you prepare, revise and pass your examinations for all majors and modules. For assistance with online tutoring and Help with Class assignments, thesis, dissertations and essay writing with a guaranteed PASS & QUALITY reach out: . Good Luck.

3.8

149 reviews

5
71
4
23
3
27
2
7
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions