ITN 260 Final Exam Study Questions and Correct Answers (Verified Answers)
7 views 0 purchase
Course
ITN 260
Institution
ITN 260
ITN 260 Final Exam Study Questions and Correct Answers (Verified Answers)
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? - Answer- LDAP injection
The X....
ITN 260 Final Exam Study Questions
and Correct Answers (Verified
Answers)
What kind of attack allows for the construction of LDAP statements based on user input
statements, which can then be used to access the LDAP database or modify the
database's information? - Answer- LDAP injection
The X.500 standard defines a protocol for a client application to access an X.500
directory known as which of the following options? - Answer- DAP
Select below the access control model that uses access based on a user's job function
within an organization: - Answer- Role Based Access Control
Although designed to support remote dial-in access to a corporate network, what
service below is commonly used with 802.1x port security for both wired and wireless
LANs? - Answer- RADIUS
Which access control model can dynamically assign roles to subjects based on a set of
defined rules? - Answer- Rule Based Access Control
A list that specifies which subjects are allowed to access an object and what operations
they can perform on it is referred to as a(n): - Answer- ACL
To assist with controlling orphaned and dormant accounts, what can be used to indicate
when an account is no longer active? - Answer- Account expiration
A vulnerable process that is divided between two or more individuals to prevent
fraudulent application of the process is known as: - Answer- Separation of duties
What type of attack involves an attacker stealing a file containing password digests and
comparing the digests with digests created by the attacker? - Answer- Offline cracking
What kind of biometrics utilizes a person's unique physical characteristics for
authentication, such as fingerprints or unique characteristics of a person's face? -
Answer- Standard biometrics
Passwords that are transmitted can be captured by what type of software? - Answer-
Protocol analyzer
, A U.S. Department of Defense (DoD) smart card that is used for identification of active-
duty and reserve military personnel along with civilian employees and special
contractors is called: - Answer- Common Access Card (CAC)
The use of what item below involves the creation of a large pregenerated data set of
candidate digests? - Answer- Rainbow tables
Using a rainbow table to crack a password requires three steps: Creation of the table,
comparing the table to known hash values, and decrypting the password. - Answer-
False
A secret combination of letters, numbers, and/or characters that only the user should
have knowledge of, is known as a: - Answer- Password
Select below the decentralized open-source FIM that does not require specific software
to be installed on the desktop: - Answer- OpenID
What can be used to increase the strength of hashed passwords? - Answer- Salt
Passwords provide strong protection. - Answer- False
What type of plans include procedures to address redundancy and fault tolerance as
well as data backups? - Answer- Disaster recovery
Which term below describes a component or entity in a system which, if it no longer
functions, will disable an entire system? - Answer- Single point of failure
Select below the type of cluster that is used to provide high-availability applications that
require a high level of read and write actions, such as databases, messaging systems,
and file and print services: - Answer- Asymmetric server
A service contract between a vendor and a client that specifies what services will be
provided, the responsibilities of each party, and any guarantees of service, is known as:
- Answer- Service level agreement
What RAID type below utilizes parity data across all drives instead of using a separate
drive to hold parity error checking information? - Answer- RAID 5
Multiple sectors on a disk, when combined, are referred to as a: - Answer- Cluster
What kind of slack is created from information stored on a hard drive, which can contain
remnants of previously deleted files or data? - Answer- Drive file slack
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives
in the server to the same disk controller card. - Answer- False
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.