100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam Study Questions and Correct Answers (Verified Answers) $13.99   Add to cart

Exam (elaborations)

ITN 260 Final Exam Study Questions and Correct Answers (Verified Answers)

 0 view  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 Final Exam Study Questions and Correct Answers (Verified Answers) What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? - Answer- LDAP injection The X....

[Show more]

Preview 2 out of 6  pages

  • October 10, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • itn 260
  • ITN 260
  • ITN 260
avatar-seller
Scholarsstudyguide
ITN 260 Final Exam Study Questions
and Correct Answers (Verified
Answers)

What kind of attack allows for the construction of LDAP statements based on user input
statements, which can then be used to access the LDAP database or modify the
database's information? - Answer- LDAP injection

The X.500 standard defines a protocol for a client application to access an X.500
directory known as which of the following options? - Answer- DAP

Select below the access control model that uses access based on a user's job function
within an organization: - Answer- Role Based Access Control

Although designed to support remote dial-in access to a corporate network, what
service below is commonly used with 802.1x port security for both wired and wireless
LANs? - Answer- RADIUS

Which access control model can dynamically assign roles to subjects based on a set of
defined rules? - Answer- Rule Based Access Control

A list that specifies which subjects are allowed to access an object and what operations
they can perform on it is referred to as a(n): - Answer- ACL

To assist with controlling orphaned and dormant accounts, what can be used to indicate
when an account is no longer active? - Answer- Account expiration

A vulnerable process that is divided between two or more individuals to prevent
fraudulent application of the process is known as: - Answer- Separation of duties

What type of attack involves an attacker stealing a file containing password digests and
comparing the digests with digests created by the attacker? - Answer- Offline cracking

What kind of biometrics utilizes a person's unique physical characteristics for
authentication, such as fingerprints or unique characteristics of a person's face? -
Answer- Standard biometrics

Passwords that are transmitted can be captured by what type of software? - Answer-
Protocol analyzer

, A U.S. Department of Defense (DoD) smart card that is used for identification of active-
duty and reserve military personnel along with civilian employees and special
contractors is called: - Answer- Common Access Card (CAC)

The use of what item below involves the creation of a large pregenerated data set of
candidate digests? - Answer- Rainbow tables

Using a rainbow table to crack a password requires three steps: Creation of the table,
comparing the table to known hash values, and decrypting the password. - Answer-
False

A secret combination of letters, numbers, and/or characters that only the user should
have knowledge of, is known as a: - Answer- Password

Select below the decentralized open-source FIM that does not require specific software
to be installed on the desktop: - Answer- OpenID

What can be used to increase the strength of hashed passwords? - Answer- Salt

Passwords provide strong protection. - Answer- False

What type of plans include procedures to address redundancy and fault tolerance as
well as data backups? - Answer- Disaster recovery

Which term below describes a component or entity in a system which, if it no longer
functions, will disable an entire system? - Answer- Single point of failure

Select below the type of cluster that is used to provide high-availability applications that
require a high level of read and write actions, such as databases, messaging systems,
and file and print services: - Answer- Asymmetric server

A service contract between a vendor and a client that specifies what services will be
provided, the responsibilities of each party, and any guarantees of service, is known as:
- Answer- Service level agreement

What RAID type below utilizes parity data across all drives instead of using a separate
drive to hold parity error checking information? - Answer- RAID 5

Multiple sectors on a disk, when combined, are referred to as a: - Answer- Cluster

What kind of slack is created from information stored on a hard drive, which can contain
remnants of previously deleted files or data? - Answer- Drive file slack

RAID level 0 is known as disk mirroring, because it involves connecting multiple drives
in the server to the same disk controller card. - Answer- False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart