100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS $12.59   Add to cart

Exam (elaborations)

ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS

 0 view  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS Which of the following is malicious computer code that reproduces itself on the same computer? - Answer- virus What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically ...

[Show more]

Preview 2 out of 6  pages

  • October 10, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 260
  • ITN 260
avatar-seller
Scholarsstudyguide
ITN 260 EXAM QUESTIONS WITH
ALL CORRECT ANSWERS

Which of the following is malicious computer code that reproduces itself on the same
computer? - Answer- virus

What kind of software program delivers advertising content in a manner that is
unexpected and unwanted by the user, and is typically included in malware? - Answer-
Adware

Which of the following is not one of the four methods for classifying the various types of
malware - Answer- Source

A virus that infects an executable program file is known as? - Answer- program virus

What type of malware consists of a set of software tools used by an attacker to hide the
actions or presence of other types of malicious software, such as Trojans, viruses, or
worms? - Answer- rootkit

A series of instructions that can be grouped together as a single command and are
often used to automate a complex set of tasks or a repeated series of tasks are known
as: - Answer- A macro

Malware that locks or prevents a device from functioning properly until a fee has been
paid is known as: - Answer- Ransomware

What is the maximum effective range of a typical passive RFID tag? - Answer- 19

An attack in which the attacker attempts to impersonate the user by using his or her
session token is known as: - Answer- Session hijacking

HTML uses which option below within embedded brackets (< >) causing a web browser
to display text in a specific format? - Answer- tags

Which SQL injection statement example below could be used to discover the name of
the table? - Answer- whatever' AND 1=(SELECT COUNT(*) FROM tabname); --

When TCP/IP was developed, the host table concept was expanded into a hierarchical
name system for matching computer names and numbers using this service: - Answer-
DNS

, Which SQL injection statement can be used to erase an entire database table? -
Answer- whatever'; DROP TABLE members

Cipher locks are sometimes combined with what type of sensor, which uses infrared
beams that are aimed across a doorway? - Answer- Tailgate sensors

Instead of trying to make a match, modern AV techniques are beginning to use a type of
detection that attempts to identify the characteristics of a virus. What is the name for this
technique? - Answer- heuristic detection

A spiked collar that extends horizontally for up to 3 feet from the pole is an example of
what kind of technology? - Answer- Anti-climb

Which of the following is not one of the types of settings that would be included in a
Microsoft Windows security template? - Answer- Resolution settings

On a compromised computer, you have found that a user without administrative
privileges was able to perform a task limited to only administrative accounts. What type
of exploit has occurred? - Answer- Privilege escalation

Select the tool below that consists of a system of security tools that is used to recognize
and identify data that is critical to an organization and ensure that it is protected: -
Answer- Data Loss Prevention

The exchange of information among DNS servers regarding configured zones is known
as: - Answer- zone transfer

What language below is for the transport and storage of data, with the focus on what the
data is? - Answer- XML

How can an attacker substitute a DNS address so that a computer is automatically
redirected to another device? - Answer- DNS poisoning

What type of video surveillance is typically used by banks, casinos, airports, and military
installations, and commonly employs guards who actively monitor the surveillance? -
Answer- CCTV

Attacks that take place against web based services are considered to be what type of
attack? - Answer- Server Side

How can an area be made secure from a non-secured area via two interlocking doors to
a small room? - Answer- Using a mantrap

The default root directory of the Microsoft Internet Information Services (IIS) Web server
is located at which directory below? - Answer- C:\Inetpub\ wwwroot

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.59
  • (0)
  Add to cart