Because attackers break into systems for various reasons, it is important for information security professionals to understand how malicious hackers exploit systems and the probable reasons behind the attacks.
A True
B False - ANSWER A
Information security refers to ________ or ________ information and information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - ANSWER D
Information is not the critical asset that organizations need to secure.
A False
B True - ANSWER A
________ is the part of a malware or an exploit that performs the intended malicious actions, which can include creating backdoor access to a victim's machine, damaging or deleting files, and data theft.
A Payload
B Vulnerability
C Exploit
D Hack value - ANSWER A
In a ________, the attacker exploits vulnerabilities in a computer application before the software developer can release a patch for them.
A payload
B zero-day attack
C hack value
D vulnerability - ANSWER B
Category | WGU EXAM |
Comments | 0 |
Rating | |
Sales | 0 |