100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) $20.49   Add to cart

Exam (elaborations)

ITN 263 Midterm Exam | Questions and Answers (Complete Solutions)

 15 views  0 purchase
  • Course
  • ITN 263
  • Institution
  • ITN 263

ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) Who performs penetration testing? ethical hackers Which type of backup solution typically stores your data on another organization's hardware, making you dependent on their security, confidentiality assurance, and reliability? Clou...

[Show more]

Preview 3 out of 21  pages

  • August 4, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 263
  • ITN 263
avatar-seller
Bri254
ITN 263 Midterm Exam


Who performs penetration testing?
ethical hackers

Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability?
Cloud

An Access Control List (ACL) is an example of which of the following?
logical security

A security assessment may include which of the following steps?
perform a risk assessment
perform penetration testing
perform vulnerability scanning

Which of the following is a method of trapping hackers and detecting new attacks?
Honeypot

What is not an example of containment during incident response?
confirming a breach

Which of the following is an example of multi-factor authentication? Choose the best
answer.
a user accesses the server (login) with a username, password, and RSA token card

The best practice of 'use default deny over default permit' can be applied to which of the
following system? Choose the best answer.
Firewalls

What is the purpose of the post-mortem review after a security assessment?
learn from mistakes

What is another form of a honeypot?
padded cell

Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________.
separation of duties

,Window locks, door locks, and security cameras are examples of which of the
following?
physical security

One of the most effective preventative techniques in network security troubleshooting is
__________.
installing patches and updates

Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________.
principle of least privilege

Which of the following is an example of multi-factor authentication? choose the best
answer.
a bank ATM card and a pin number

Which of the following must an administrator organize to ensure follow-through of a new
security plan?
end-user training and awareness

Which of the following is not a network security management best practice?
implement single-factor authentication

Which of the following could compromise network security?
simplify by assigning maximum required permissions

Giving network users enough permissions to do their job is an example of , is an
example of __________.
least privilege

What is a potential disadvantage of online data backups?
dependency on provider's security

Which of the following helps avoid single points of failure by building in multiple
elements, pathways, or methods of accomplishing mission-critical tasks?
Redundancy

Using a fingerprint to unlock a workstation is an example of which of the following?
something you are

Which entity is responsible for global coordination of IP addressing?
Internet Assigned Numbers Authority (IANA)

What is accomplished with IP addressing?
Traffic management through routing
Traffic filtering

, Hardening is the process of reducing the _________ of a potential target by removing
unnecessary components and adding protections.
attack surface

Which of the following is the best reason you might switch from IPv4 to IPv6 as your
primary network protocol?
Security

Which IT domain marks the boundary where the private network meets the public
network?
LAN-to-WAN domain

Uninstalling all unnecessary applications and services on a user system is an example
of system hardening. In which IT domain is client system hardening typically applied?
Workstation Domain

Logging the time a user accessed a particular resource is an example of which of the
following?
Accounting

What employs routing protocols to exchange information about routes and connected
pathways? This information calculates the best path to guide a packet towards its
destination.
Router

The address range 192.168.0.0-192.168.255.255/16 is an example of which of the
following?
Class C

What is defined as any device on a network, even those without an IP address?
Node

Bus, tree, and mesh are types of __________.
network topologies

Why might you develop an acceptable use policy?
to establish network usage rules

When selecting networking equipment, which of the following is not a desirable feature
from a security perspective?
easy power switch

The principle of least privilege is often a good guideline as to appropriate ___________
settings.
authorization

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $20.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$20.49
  • (0)
  Add to cart