100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU D315 V2 Section 2 Study plan Quiz questions with verified answers

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
25-02-2025
Written in
2024/2025

WGU D315 V2 Section 2 Study plan Quiz questions with verified answers










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
February 25, 2025
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU D315 V2 Section 2 Study plan Quiz questions
with verified answers
A type of passive attack Ans✓✓✓-In the context of IT security, wiretapping is
considered


A weakness or flaw in hardware, software, or facilities that can be taken
advantage of to compromise security Ans✓✓✓-Which of the following is the best
definition of a security Vulnerability?


An exploit Ans✓✓✓-A hacker uses a script that automatically injects SQL
commands into web forms to steal data from a database. This script is an example
of:


ARP Poisoning Ans✓✓✓-What type of attack involves modifying network tables
to associate the attacker's MAC address with the IP address of a legitimate user?


Availability Ans✓✓✓-A distributed denial of service (DDoS) attack overwhelms a
popular e-commerce website, causing it to crash. Which element of the CIA Triad
is directly impacted?


Availability Ans✓✓✓-A healthcare provider's patient portal becomes inaccessible
due to a misconfigured firewall that blocks incoming patient traffic. This scenario
primarily compromises which principle of the CIA triad?


Availability Ans✓✓✓-During a network upgrade, an administrator mistakenly
cuts off the backup data center from the main network. This error leaves the
organization without a failover option in case of a primary data center failure.
What aspect of the CIA triad has been compromised?

, Black Hat Hacker Ans✓✓✓-Someone who breaks into digital systems with the
intention of creating and spreading malware for financial gain would be
considered a:


Brute Force Attack Ans✓✓✓-In cybersecurity, what type of attack involves
systematically trying all possible combinations of letters, numbers, and special
characters to compromise a password


Card key access system to the server room Ans✓✓✓-An organization wants to
ensure that only authorized personnel can access the server room. Which of the
following is the most effective solution?


Confidentiality Ans✓✓✓-An attacker uses a zero-day exploit to install spyware on
a corporate network, allowing them to monitor all internal communications. This
attack compromises which principle of the CIA triad?


Confidentiality Ans✓✓✓-An employee at a financial institution accidentally
emails a spreadsheet containing sensitive customer information to the wrong
recipient. Which aspect of the CIA Triad is compromised in this scenario?


Confidentiality Ans✓✓✓-An employee loses a laptop containing unencrypted
personal data of clients. Which principle of the CIA triad is primarily
compromised?


External Threat Ans✓✓✓-An attacker is trying to infiltrate the network from an
offsite location. What type of threat does this attacker represent?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
cracker Chamberlain School Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2013
Member since
3 year
Number of followers
1342
Documents
46921
Last sold
1 day ago
✨ Cracker – Verified Study Powerhouse

Welcome to your shortcut to academic and certification success. I'm Cracker, a trusted top seller I specialize in high-quality study guides, test banks, certification prep, and real-world exam material all tailored to help you pass fast and score high.

3.8

368 reviews

5
162
4
84
3
51
2
22
1
49

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions