Because
attackers break into systems for various reasons, it is important for
information security professionals to understand how malicious hackers exploit
systems and the probable reasons behind the attacks.
A
True
B
False Correct Ans - A
Information
security refers to ________ or ________ information and information systems
that use, store, and transmit information from unauthorized access, disclosure,
alteration, and destruction.
A
compiling / securing
B
imaging / shielding
C
duplicating / saving
D
protecting / safeguarding Correct
Ans -
D
Information
is not the critical asset that organizations need to secure.
A
False
B
True Correct Ans - A
________
is the part of a malware or an exploit that performs the intended malicious
actions, which can include creating backdoor access to a victim's machine,
damaging or deleting files, and data theft.
A
Payload
B
Vulnerability
C
Exploit
D
Hack value Correct Ans - A
In
a ________, the attacker exploits vulnerabilities in a computer application
before the software developer can release a patch for them.
A
payload
B
zero-day attack
C
hack value
D
vulnerability Correct Ans - B
Information
security is defined as "a state of well-being of information and
infrastructure in which the possibility of theft, tampering, and disruption of
information and services is kept low and tolerable."
A
False
B
True Correct Ans - B
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |