100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 267 QUIZ 1 -5 || with Errorless Solutions 100%. £9.69
Add to cart

Exam (elaborations)

ITN 267 QUIZ 1 -5 || with Errorless Solutions 100%.

 7 views  0 purchase
  • Module
  • ITN 267
  • Institution
  • ITN 267

A _____________is a method of controlled entry into a facility and provides access to secure areas such as a research lab or data center. key-card mantrap video surveillance system technical safeguard correct answers mantrap A single point of failure is a piece of hardware or application t...

[Show more]

Preview 2 out of 11  pages

  • December 19, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 267
  • ITN 267
avatar-seller
ITN 267 QUIZ 1 -5 || with Errorless Solutions 100%.
A _____________is a method of controlled entry into a facility and provides access to secure
areas such as a research lab or data center.

key-card
mantrap
video surveillance system
technical safeguard correct answers mantrap

A single point of failure is a piece of hardware or application that is key to
________________________.

specifying how long systems may be offline before an organization starts to lose money

the success of safeguards

ensuring that individuals with proper permission can use systems and retrieve data in a
dependable manner

the functioning of the entire system correct answers the functioning of the entire system

All of the following are ways to protect confidentiality except:

encryption
access controls
passwords
shoulder surfing correct answers shoulder surfing

In which of the following types of communication is phishing least likely to occur?

phone calls
email
instant messages
chat rooms correct answers phone calls

_______________ is the process of reviewing known vulnerabilities and threats.

Risk avoidance
Risk mitigation
Risk analysis
Risk engineering correct answers Risk analysis

___________________ refers to applying safeguards designed to lower risks to a level deemed
acceptable but without eliminating such risks.

, Residual risk
Risk avoidance
Risk mitigation
Risk transfer correct answers Risk mitigation

_________________________ involves tricking other people into breaking security procedures
and sharing sensitive information.

Shoulder surfing
E-mail spam
Social engineering
Integrity correct answers Social engineering

What is the window of vulnerability?

the period of time when antivirus software must be updated

the period of time when an attacker may launch a DoS attack

the time between a malware attack and discovery by security personnel

the time between exploit discovery and an installed security patch correct answers the time
between exploit discovery and an installed security patch

What situation would be an example of an exploit?

A major league baseball pitcher takes his daughter to a carnival and plays a game wherein he can
earn prizes if he can use a beanbag to knock over all of the cans stacked in a pyramid formation
in the game's booth. In each of the 10 rounds of the carnival game that the pitcher plays, he
knocks down all the cans, and he wins his daughter the largest stuffed animal prize in the booth.

An art thief sneaks into a museum and steals a famous painting and then sneaks out of the
museum without being caught by security because the thief identified and traveled through the
museum via blind spots of the museum's security cameras. After the incident, the museum
increases the number of security guards and cameras guarding the museum at all times.

A film reel catches fire in the middle of a crowded showing of a popular new release film. The
film is ruined. Due to the cinema's po correct answers An art thief sneaks into a museum and
steals a famous painting and then sneaks out of the museum without being caught by security
because the thief identified and traveled through the museum via blind spots of the museum's
security cameras. After the incident, the museum increases the number of security guards and
cameras guarding the museum at all times.

Which of the following statements summarizes why the window of vulnerability is shrinking?

People are getting better at enduring and recovering from exploits.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £9.69. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50990 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 15 years now

Start selling
£9.69
  • (0)
Add to cart
Added