ITN 260 FINAL EXAM 2023 LATEST QAS 2023 GRADED A+
ITN 260 FINAL EXAM 2023 LATEST QAS 2023 GRADED A+ The Chief Technology Officer (CTO) of a company, Ann, is putting together a hardware budget for the next 10 years. She is asking for the average lifespan of each hardware device so that she can calculate when she will have to replace each device. Which of the following categories BEST describes what she is looking for? A. ALE B. MTTR C. MTBF D. MTTF - ANSWER D. MTTF A security administrator wishes to implement a secure method of file transfer when communicating with outside organizations. Which of the following protocols would BEST facilitate secure file transfers? (Select TWO) A. SCP B. TFTP C. SNMP D. FTP E. SMTP F. FTPS - ANSWER A. SCP & F. FTPS An organization requires users to provide their fingerprints to access an application. ITN 260 FINAL EXAM 2023 LATEST QAS 2023 GRADED A+ To improve security, the application developers intend to implement multifactor authentication. Which of the following should be implemented? A. Use a camera for facial recognition B. Have users sign their name naturally C. Require a palm geometry scan D. Implement iris recognition - ANSWER B. Have users sign their name naturally A company's AUP requires: - Passwords must meet complexity requirements. - Passwords are changed at least once every six months. - Passwords must be at least eight characters long. An auditor is reviewing the following report: Which of the following controls should the auditor recommend to enforce the AUP? A. Account lockout thresholds B. Account recovery C. Password expiration D. Prohibit password reuse - ANSWER C. Password expiration ITN 260 FINAL EXAM 2023 LATEST QAS 2023 GRADED A+ Which of the following are used to increase the computing time it takes to brute force a password using an offline attack? (Select TWO) A. XOR B. PBKDF2 C. bcrypt D. HMAC E. RIPEMD - ANSWER B. PBKDF2 & C. bcrypt A datacenter recently experienced a breach. When access was gained, an RF device was used to access an air-gapped and locked server rack. Which of the following would BEST prevent this type of attack? A. Faraday cage B. Smart cards C. Infrared detection D. Alarms - ANSWER A. Faraday Cage Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host? A. Remote exploit B. Amplification ITN 260 FINAL EXAM 2023 LATEST QAS 2023 GRADED A+ C. Sniffing D. Man-in-the-middle - ANSWER A. Remote exploit Upon entering an incorrect password, the logon screen displays a message informing the user that the password does not match the username provided and is not the required length of 12 characters. Which of the following secure coding techniques should a security analyst address with the application developers to follow security best practices? A. Input validation B. Error handling C. Obfuscation D. Data exposure - ANSWER B. Error handling A company was recently audited by a third party. The audit revealed the company's network devices were transferring files in the clear. Which of the following protocols should the company use to transfer files? A. HTTPS
Written for
- Institution
- ITN 260
- Course
- ITN 260
Document information
- Uploaded on
- November 21, 2023
- Number of pages
- 35
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- itn 260 final exam
- itn 260 final
- itn 260
-
itn 260 final exam 2023 latest qas 2023 graded a
-
itn 260 final exam 2023 latest qas 2023 graded a