100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
1. The polymerase chain reaction is a tool used to study protein structure. True False - CORRECT ANSWERS False Feedback PCR is a tool used to amplify a specific segment of DN $12.49   Add to cart

Exam (elaborations)

1. The polymerase chain reaction is a tool used to study protein structure. True False - CORRECT ANSWERS False Feedback PCR is a tool used to amplify a specific segment of DN

 0 view  0 purchase
  • Course
  • Institution

1. The polymerase chain reaction is a tool used to study protein structure. True False - CORRECT ANSWERS False Feedback PCR is a tool used to amplify a specific segment of DN

Preview 4 out of 94  pages

  • January 1, 2023
  • 94
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
WGU Master's Course C701Ethical
Hacking
Because attackers break into systems for various reasons, it is important for information
security professionals to understand how malicious hackers exploit systems and the
probable reasons behind the attacks.

A True
B False - CORRECT ANSWERS A

Information security refers to ________ or ________ information and information
systems that use, store, and transmit information from unauthorized access, disclosure,
alteration, and destruction.

A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - CORRECT ANSWERS D

Information is not the critical asset that organizations need to secure.

A False
B True - CORRECT ANSWERS A

________ is the part of a malware or an exploit that performs the intended malicious
actions, which can include creating backdoor access to a victim's machine, damaging or
deleting files, and data theft.

A Payload
B Vulnerability
C Exploit
D Hack value - CORRECT ANSWERS A

In a ________, the attacker exploits vulnerabilities in a computer application before the
software developer can release a patch for them.

A payload
B zero-day attack
C hack value
D vulnerability - CORRECT ANSWERS B

Information security is defined as "a state of well-being of information and infrastructure
in which the possibility of theft, tampering, and disruption of information and services is
kept low and tolerable."

A False
B True - CORRECT ANSWERS B

,WGU Master's Course C701Ethical
Hacking
Information security relies on four major elements: confidentiality, integrity, availability,
and authenticity.

A True
B False - CORRECT ANSWERS B

________ is the assurance that the information is accessible only to those authorized to
have access.

A Availability
B Confidentiality
C Authenticity
D Integrity - CORRECT ANSWERS B

Confidentiality controls include data classification, data encryption, and proper
equipment disposal.

A False
B True - CORRECT ANSWERS B

________ is trustworthiness of data or resources in the prevention of improper and
unauthorized changes—the assurance that information is sufficiently accurate for its
purpose.

A Confidentiality
B Availability
C Authenticity
D Integrity - CORRECT ANSWERS D

Measures to maintain data integrity may include a checksum and access control.

A False
B True - CORRECT ANSWERS B

________ is the assurance that the systems responsible for delivering, storing, and
processing information are accessible when required by authorized users.

A Integrity
B Confidentiality
C Availability
D Authenticity - CORRECT ANSWERS C

,WGU Master's Course C701Ethical
Hacking
Measures to maintain data availability do not include redundant systems' disk array and
clustered machines, antivirus software to stop worms from destroying networks, and
distributed denial-of-service (DDoS) prevention systems.

A True
B False - CORRECT ANSWERS B

The major role of ________ is to confirm that a user is who he or she claims to be.

A availability
B integrity
C confidentiality
D authenticity - CORRECT ANSWERS D

Controls such as biometrics, smart cards, and digital certificates ensure the authenticity
of data, transactions, communications, or documents.

A False
B True - CORRECT ANSWERS B

________ is a way to guarantee that the sender of a message cannot later deny having
sent the message, and that the recipient cannot deny having received the message.

A Confidentiality
B Integrity
C Authenticity
D Non-repudiation - CORRECT ANSWERS D

Individuals and organizations use digital signatures to ensure non-repudiation.

A True
B False - CORRECT ANSWERS A

Hacking is defined as the exploitation of vulnerabilities of computer systems and
networks.

A False
B True - CORRECT ANSWERS B

For attackers, motives are the same as:

A Ethics
B Ideas
C Values

, WGU Master's Course C701Ethical
Hacking
D Goals - CORRECT ANSWERS D

The term information warfare or InfoWar refers to the use of information and
communication technologies (ICT) for competitive advantages over an opponent.

A True
B False - CORRECT ANSWERS A

Information warfare is divided into ________ categories.

A five
B four
C six
D seven - CORRECT ANSWERS D

Each category of information warfare consists of both offensive and defensive
strategies.

A True
B False - CORRECT ANSWERS A

Defensive Information Warfare refers to all strategies and actions to defend against
attacks on ICT assets.

A True
B False - CORRECT ANSWERS A

Offensive Information Warfare refers to warfare against the assets of an opponent.

A True
B False - CORRECT ANSWERS A

________ techniques include creating viruses and worms, performing denial-of-service
(DoS) attacks as well as establishing unauthorized remote access connections to a
device using Trojans/backdoors, creating botnets, packet sniffing, phishing, and
password cracking.

A Personal-hacking
B Network-hacking
C Server-hacking
D Intelligence-hacking - CORRECT ANSWERS B

Hackers are intelligent individuals with excellent computer skills—with the ability to
create and explore the computer's software and hardware.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EWLindy. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$12.49
  • (0)
  Add to cart