WGU D315 V2 SECTION 2 STUDY PLAN | PA|PRE-
ASSESSMENT
Correct
Incorrect
creating and spreading malware for financial gain would be
, Don't know?
2 of 40
Definition
What type of attack floods a network with ICMP echo request
packets, amplifying the attack by using a large number of hosts?
Give this one a try later!
Ddos Attack Fraggle Attack
Ping Sweep Attack Smurf Attack
Don't know?
3 of 40
Definition
A hacker uses a script that automatically injects SQL commands into
web forms to steal data from a database. This script is an example of:
Give this one a try later!
An accident An accomplishment
, A threat An exploit
Don't know?
4 of 40
Definition
Upon discovering a malware infection on a computer, what is the
FIRST action that should be taken?
Give this one a try later!
Install new software on the Isolate the infected computer
computer from the network
Reboot the computer immediately Backup all files on the computer
Don't know?
5 of 40
Definition
A cybersecurity expert is legally hired by a corporation to find
vulnerabilities in its network and strengthen its defenses. This expert
is known as a:
Give this one a try later!
ASSESSMENT
Correct
Incorrect
creating and spreading malware for financial gain would be
, Don't know?
2 of 40
Definition
What type of attack floods a network with ICMP echo request
packets, amplifying the attack by using a large number of hosts?
Give this one a try later!
Ddos Attack Fraggle Attack
Ping Sweep Attack Smurf Attack
Don't know?
3 of 40
Definition
A hacker uses a script that automatically injects SQL commands into
web forms to steal data from a database. This script is an example of:
Give this one a try later!
An accident An accomplishment
, A threat An exploit
Don't know?
4 of 40
Definition
Upon discovering a malware infection on a computer, what is the
FIRST action that should be taken?
Give this one a try later!
Install new software on the Isolate the infected computer
computer from the network
Reboot the computer immediately Backup all files on the computer
Don't know?
5 of 40
Definition
A cybersecurity expert is legally hired by a corporation to find
vulnerabilities in its network and strengthen its defenses. This expert
is known as a:
Give this one a try later!