WGU D315 SECTION 2 EXAM QUESTIONS &
ACCURATE CORRECT ANSWERS 100%
1. a group of security professionals who simulate
Red Team
real-world attacks on an organization's systems,
net- works, and applications to test their
defenses.
2. an individual who uses existing scripts or Script Kiddie
tools de- veloped by others to carry out
cyberattacks, without understanding the
underlying technology or the con- sequences
of their actions.
White hat hacker
3. a cybersecurity professional who uses their
hacking skills ethically and legally to help
organizations identify and fix security
vulnerabilities.
4. an individual who uses their technical skills and knowl- Black hat
hacker
edge to exploit vulnerabilities in computer
systems, networks, or applications for
malicious purposes.
5. a group that oversees and manages the White team
activities of both red and blue teams during
security exercises and simulations, such as
penetration tests, red teaming engagements,
or capture-the-flag (CTF) events.
6. a collaborative effort between the red team (offensive Purple team
security professionals) and the blue team
(defensive security professionals).
7. a type of cyber attack that manipulates individuals into Social
engineering attack
1/
7
, WGU D315 SECTION 2 EXAM QUESTIONS &
ACCURATE CORRECT ANSWERS 100%
divulging confidential information, providing
access to systems, or performing actions that
may compromise security.
8. SQL injection
2/
7
ACCURATE CORRECT ANSWERS 100%
1. a group of security professionals who simulate
Red Team
real-world attacks on an organization's systems,
net- works, and applications to test their
defenses.
2. an individual who uses existing scripts or Script Kiddie
tools de- veloped by others to carry out
cyberattacks, without understanding the
underlying technology or the con- sequences
of their actions.
White hat hacker
3. a cybersecurity professional who uses their
hacking skills ethically and legally to help
organizations identify and fix security
vulnerabilities.
4. an individual who uses their technical skills and knowl- Black hat
hacker
edge to exploit vulnerabilities in computer
systems, networks, or applications for
malicious purposes.
5. a group that oversees and manages the White team
activities of both red and blue teams during
security exercises and simulations, such as
penetration tests, red teaming engagements,
or capture-the-flag (CTF) events.
6. a collaborative effort between the red team (offensive Purple team
security professionals) and the blue team
(defensive security professionals).
7. a type of cyber attack that manipulates individuals into Social
engineering attack
1/
7
, WGU D315 SECTION 2 EXAM QUESTIONS &
ACCURATE CORRECT ANSWERS 100%
divulging confidential information, providing
access to systems, or performing actions that
may compromise security.
8. SQL injection
2/
7