• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

WGU Master's Course C701 - Ethical Hacking (Practice Exam 124 questions and answers )

WGU EXAM Mar 31, 2024
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

Which of the following information security elements guarantees that the sender of a message cannot later deny having sent the message and the recipient cannot deny having received the message?


A Confidentiality

B Non-repudiation

C Availability

D Integrity Correct answer- B


A phase of the cyber kill chain methodology triggers the adversary's malicious code, which utilizes a vulnerability in the operating system, application, or server on a target system. At this stage, the organization may face threats such as authentication and authorization attacks, arbitrary code execution, physical security threats, and security misconfiguration. 


Which is this phase of the cyber kill chain methodology?


A Reconnaissance

B Weaponization

C Exploitation

D Installation Correct answer- C


Which of the following is a category of hackers who are also known as crackers, use their extraordinary computing skills for illegal or malicious purposes, and are often involved in criminal activities?


A Black hats

B White hats

C Suicide hackers

D Script kiddies Correct answer- A


John, a professional hacker, has launched an attack on a target organization to extract sensitive information. He was successful in launching the attack and gathering the required information. He is now attempting to hide the malicious acts by overwriting the server, system, and application logs to avoid suspicion.


Which of the following phases of hacking is John currently in?


A Maintaining access

B Scanning

C Clearing tracks

D Gaining access Correct answer- C


Which of the following risk management phases involves selecting and implementing appropriate controls for the identified risks to modify them?


A Risk tracking and review

B Risk identification

C Risk treatment

D Risk assessment Correct answer- C














Download Study Material

Buy This Study Material

$15.00
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: WGU EXAM
Description:

WGU Master's Course C701 - Ethical Hacking (Practice Exam 124 questions and answers )

UNLOCK ACCESS $15.00