ACTUAL NEW SOLUTION FALL 2026-2027 Western Governors University
D315 V2 Section 2 Study Plan Quiz (2nd
Attempt)
Points: 92.5/100
Correct 2.5/2.5 Points
1. Which of the following is a fake device designed to tempt intruders with unpatched
and unprotected security vulnerabilities and false data? *
IDS
Honeypot
Firewall
Proxy
Correct 2.5/2.5 Points
2. An activist group infiltrates and defaces a corporate website to draw attention to
an environmental issue. The group's members are best described as: *
Black Hat Hacker
,White Hat Hacker
Grey Hat Hacker
Hacktivist
, Correct 2.5/2.5 Points
3. Which risk management strategy involves implementing security measures to
decrease the probability of a risk happening or to lessen its effects should it occur?
*
Risk Acceptance
Risk Transfer
Risk Avoidance
Risk Mitigation
Correct 2.5/2.5 Points
4. A malicious actor gains unauthorized access to a company's database and alters
financial records, changing the amounts of several transactions. What principle of
the CIA Triad is violated in this situation? *
Availability
Confidentiality
Integrity
Non-repudiation
Incorrect 0/2.5 Points
5. How can organizations reduce the risk associated with port scanning attacks? *
By frequently changing user passwords
Using firewalls to block unnecessary ports