WGU Master's Course C701 - Ethical Hacking EXAM
(TESTING REAL EXAM QUESTIONS) AND VERIFIED
ANSWERS (MULTIPLE CHOICES) |A+ GRADED |100%
CORRECT!!
Because attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A True
B False - (ANSWER)A
Information security refers to ________ or ________ information and information
systems that use, store, and transmit information from unauthorized access,
disclosure, alteration, and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - (ANSWER)D
Information is not the critical asset that organizations need to secure.
A False
B True - (ANSWER)A
,________ is the part of a malware or an exploit that performs the intended
malicious actions, which can include creating backdoor access to a victim's
machine, damaging or deleting files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - (ANSWER)A
In a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A payload
B zero-day attack
C hack value
D vulnerability - (ANSWER)B
Information security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A False
,B True - (ANSWER)B
Information security relies on four major elements: confidentiality, integrity,
availability, and authenticity.
A True
B False - (ANSWER)B
________ is the assurance that the information is accessible only to those
authorized to have access.
A Availability
B Confidentiality
C Authenticity
D Integrity - (ANSWER)B
Confidentiality controls include data classification, data encryption, and proper
equipment disposal.
A False
B True - (ANSWER)B
, ________ is trustworthiness of data or resources in the prevention of improper
and unauthorized changes—the assurance that information is sufficiently
accurate for its purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - (ANSWER)D
Measures to maintain data integrity may include a checksum and access control.
A False
B True - (ANSWER)B
________ is the assurance that the systems responsible for delivering, storing,
and processing information are accessible when required by authorized users.
A Integrity
B Confidentiality
C Availability
D Authenticity - (ANSWER)C
(TESTING REAL EXAM QUESTIONS) AND VERIFIED
ANSWERS (MULTIPLE CHOICES) |A+ GRADED |100%
CORRECT!!
Because attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A True
B False - (ANSWER)A
Information security refers to ________ or ________ information and information
systems that use, store, and transmit information from unauthorized access,
disclosure, alteration, and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - (ANSWER)D
Information is not the critical asset that organizations need to secure.
A False
B True - (ANSWER)A
,________ is the part of a malware or an exploit that performs the intended
malicious actions, which can include creating backdoor access to a victim's
machine, damaging or deleting files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - (ANSWER)A
In a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A payload
B zero-day attack
C hack value
D vulnerability - (ANSWER)B
Information security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A False
,B True - (ANSWER)B
Information security relies on four major elements: confidentiality, integrity,
availability, and authenticity.
A True
B False - (ANSWER)B
________ is the assurance that the information is accessible only to those
authorized to have access.
A Availability
B Confidentiality
C Authenticity
D Integrity - (ANSWER)B
Confidentiality controls include data classification, data encryption, and proper
equipment disposal.
A False
B True - (ANSWER)B
, ________ is trustworthiness of data or resources in the prevention of improper
and unauthorized changes—the assurance that information is sufficiently
accurate for its purpose.
A Confidentiality
B Availability
C Authenticity
D Integrity - (ANSWER)D
Measures to maintain data integrity may include a checksum and access control.
A False
B True - (ANSWER)B
________ is the assurance that the systems responsible for delivering, storing,
and processing information are accessible when required by authorized users.
A Integrity
B Confidentiality
C Availability
D Authenticity - (ANSWER)C