100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Exam final ITN 266(completed)2022 $10.99   Add to cart

Exam (elaborations)

Exam final ITN 266(completed)2022

 1 view  0 purchase
  • Course
  • Institution

00:00 01:07 In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. extortion Under current U.S. federal laws, if a company allows personal information to be stolen, it may be subject to government fines. ...

[Show more]

Preview 2 out of 9  pages

  • August 19, 2022
  • 9
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Exam final ITN 266
Countries would engage in cyberwar - Answer Both before a physical attack and after a
physical attack
Neither before a physical attack nor after a physical attack

The definition of spam is "unsolicited commercial e-mail." - Answer true

In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - Answer extortion

Under current U.S. federal laws, if a company allows personal information to be stolen,
it may be subject to government fines. - Answer true

Downloading pornography can lead to sexual harassment lawsuits. - Answer true

Cyberwar consists of computer-based attacks conducted by ________. - Answer
national goverments

________ can spread through e-mail attachments. - Answer both viruses and worms

A program that gives the attacker remote access control of your computer is specifically
called a ________. - Answer RAT

In pretexting, an attacker calls claiming to be a certain person in order to ask for private
information about that person. - Answer true

A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice.) - Answer SYN Flooding

Mobile code usually is delivered through ________. - Answer webpages

Most cookies are dangerous. - Answer false

If a company wishes to prosecute people or companies that steal its trade secrets, it
must take ________ precautions to protect those trade secrets. - Answer reasonable

Which of the following are types of countermeasures? - Answer all of these

About how long was the Sony PlayStation Network offline as a result of the cyber
attacks? - Answer 3 weeks

Some ________ can jump directly between computers without human intervention. -
Answer worms

, The attack method used in the Sony data breaches was ________. - Answer SQL
injection

Carding is more serious than identity theft. - Answer false

________ is a generic term for "evil software." - Answer malware

When a threat succeeds in causing harm to a business, this is a(n) ________. - Answer
breach

Botnets usually have multiple owners over time. - Answer true

Which of the following are ways that trade secret espionage occur? - Answer all of
these

Another name for safeguard is ________. - Answer countermeasure

Sending packets with false IP source addresses is called ________. - Answer IP
address spoofing

Most countermeasure controls are preventative controls. - Answer true

A ________ is a type of fix for vulnerabilities. - Answer Both work-around and service
pack

A private key/public key pair is usually created by the ________. - Answer client

________ is necessary to protect the host against attacks. - Answer Host hardening

UNIX offers ________ directory and file permissions than (as) Windows. - Answer fewer

In the context of PKI, ________ is the process of accepting public keys and providing
new digital certificates to the users. - Answer provisioning

Inheritance ________ labor costs in assigning permissions. - Answer reduces

A ________ is a small device that plugs into a standard computer port to identify the
owner. - Answer USB token

________ often get their authentication information from ________. - Answer Central
authentication servers, directory servers

In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server. - Answer ticket granting ticket

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79271 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart