100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITS Network Security UPDATED Exam Questions and CORRECT Answers $9.99   Add to cart

Exam (elaborations)

ITS Network Security UPDATED Exam Questions and CORRECT Answers

 4 views  0 purchase
  • Course
  • ITS Network Security
  • Institution
  • ITS Network Security

ITS Network Security UPDATED Exam Questions and CORRECT Answers Which controls are looked at as technical controls? - Correct Answer- Firewall and Intrusion Detection System (IDS) Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate data through a web form? -...

[Show more]

Preview 3 out of 19  pages

  • September 4, 2024
  • 19
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITS Network Security
  • ITS Network Security
avatar-seller
MGRADES
ITS Network Security UPDATED Exam
Questions and CORRECT Answers
Which controls are looked at as technical controls? - Correct Answer- Firewall and Intrusion
Detection System (IDS)


Which type of injection attack uses keywords such as SELECT and UPDATE to manipulate
data through a web form? - Correct Answer- SQL injection


An end user calls the help desk complaining about a web page not loading the most current
data for the page unless the user refreshes the page.
What should the help desk agent have the user do first? - Correct Answer- Clear out the cache


When one suspects a device has been affected by malware, what is the first step that should
be taken to remediate the device? - Correct Answer- Disconnect the device from the network


A good Audit Plan may collect both successful and failed events. - Correct Answer- True


Audit events take up computer resources and personnel time, so you should be selective
about the events to audit. - Correct Answer- True


You should always audit log-on successes. - Correct Answer- False


[Spoofing] redirects Internet traffic from one website to an identical-looking site in order to
trick you into entering your username and password into their database. - Correct Answer-
Pharming


What must take place for someone trying to enter a physical area of a building before access
control takes place? - Correct Answer- Authentication


MAC Filtering is best suited for large wireless networks. - Correct Answer- False, Mac
Filtering is best suited for small wireless networks.

,WEP is the strongest form of encryption for a wireless network. - Correct Answer- False, its
WAP


WPA/WPA2 can require an authentication server. - Correct Answer- True, if using 802.1x
mode


One of the layers of defense in the anti-phishing and malware protection strategies developed
by Microsoft is ___. - Correct Answer- SmartScreen Filter


One ways you can protect your computer from hackers and malicious software is to use ___.
- Correct Answer- Windows Firewall


What is considered the minimum length of a good password? - Correct Answer- Eight
characters


While launching a diagnostic software package, you select to RunAs Admin, this action
grants the executioner the ___ permissions. - Correct Answer- Least restrictive


If you were to launch a diagnostic software package without selecting RunAs Admin, this
action grants the executioner the ___ permissions. - Correct Answer- Most restrictive


___ allows multiple computers on an internal network to share one public IP address. -
Correct Answer- Network Address Translation (NAT)


Which type of VPN will often have a user connect through a web browser? - Correct Answer-
Secure Sockets Layer (SSL)


Which type of VPN connection usually connects two business entities? - Correct Answer-
Site-to-Site


What email filtering technique uses a list of verified DNS domains to verify that an email is
coming from a trusted IP address? - Correct Answer- Sender Policy Framework (SPF)


Applications-level firewalls can provide content filtering and virus protection. - Correct
Answer- True

, Application-level firewalls support caching. - Correct Answer- True


Application-level firewalls tend to be less resource intensive than that of a traditional
firewall. - Correct Answer- False


Which of the following are NTFS permissions? - Correct Answer- Read, Write, Modify


Which protocols are considered unsecure and should be avoided in a server enviroment? -
Correct Answer- Password Authentication Protocol (PAP) and Telnet


Which type of DNS record contains an IP address that is then used to look up an associated
host or domain name? - Correct Answer- Pointer Record (PTR)


IPSec encrypts data packets using AH. - Correct Answer- False


IPSec is a set of protocols that protects data transmission between hosts by providing
authentication and privacy. - Correct Answer- True


IPSec is used to create a secure tunnel between two computing devices. - Correct Answer-
False


IPSec uses digital signatures to create a chain of authority. - Correct Answer- False


Which of the following would be considered to be the strongest password? - Correct Answer-
j0hn$m1T


Your IT department is getting a barrage of calls from users saying that their pop-up blockers
are not blocking ads for huge discounts on software. Upon further research, you also
determine that your current malware signature files are not sufficient for removing this
nuisance from your systems.


Which type of attack is taking place? - Correct Answer- Adware

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83750 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart