WGU Master's Course C701 - Ethical Hacking
EXAM (TESTING REAL EXAM QUESTIONS) AND
VERIFIED ANSWERS (MULTIPLE CHOICES) |A+
GRADED |100% CORRECT!!
Save
Terms in this set (563)
Because attackers break A
into systems for various
reasons, it is important for
information security
professionals to
understand how malicious
hackers exploit systems
and the probable reasons
behind the attacks.
A True
B False
https://quizlet.com/1049628560/wgu-masters-course-c701-ethical-hacking-exam-testing-real-exam-questions-and-verified-answers-multiple-choices… 1/193
,5/30/25, 8:45 AM WGU Master's Course C701 - Ethical Hacking EXAM (TESTING REAL EXAM QUESTIONS) AND VERIFIED ANSWERS (MULTIPL…
Information security refers D
to ________ or ________
information and
information systems that
use, store, and transmit
information from
unauthorized access,
disclosure, alteration, and
destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting /
safeguarding
Information is not the A
critical asset that
organizations need to
secure.
A False
B True
________ is the part of a A
malware or an exploit that
performs the intended
malicious actions, which
can include creating
backdoor access to a
victim's machine,
damaging or deleting files,
and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value
https://quizlet.com/1049628560/wgu-masters-course-c701-ethical-hacking-exam-testing-real-exam-questions-and-verified-answers-multiple-choices… 2/193
,5/30/25, 8:45 AM WGU Master's Course C701 - Ethical Hacking EXAM (TESTING REAL EXAM QUESTIONS) AND VERIFIED ANSWERS (MULTIPL…
In a ________, the attacker B
exploits vulnerabilities in a
computer application
before the software
developer can release a
patch for them.
A payload
B zero-day attack
C hack value
D vulnerability
Information security is B
defined as "a state of well-
being of information and
infrastructure in which the
possibility of theft,
tampering, and disruption
of information and
services is kept low and
tolerable."
A False
B True
Information security relies B
on four major elements:
confidentiality, integrity,
availability, and
authenticity.
A True
B False
https://quizlet.com/1049628560/wgu-masters-course-c701-ethical-hacking-exam-testing-real-exam-questions-and-verified-answers-multiple-choices… 3/193
, 5/30/25, 8:45 AM WGU Master's Course C701 - Ethical Hacking EXAM (TESTING REAL EXAM QUESTIONS) AND VERIFIED ANSWERS (MULTIPL…
________ is the assurance that B
the information is
accessible only to those
authorized to have access.
A Availability
B Confidentiality
C Authenticity
D Integrity
Confidentiality controls B
include data classification,
data encryption, and
proper equipment
disposal.
A False
B True
________ is trustworthiness of D
data or resources in the
prevention of improper
and unauthorized changes
—the assurance that
information is sufficiently
accurate for its purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity
https://quizlet.com/1049628560/wgu-masters-course-c701-ethical-hacking-exam-testing-real-exam-questions-and-verified-answers-multiple-choices… 4/193