During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using WPA. What recommendation should Jim make? - ️️Use an alternate protocol like PEAP or EAP-TLS and implement WPA2 if supported.
Gordon is concerned about the possibility that hackers may be a...
ITM 450|48 Practice Questions And
Answers|2024
During a security assessment of a wireless network, Jim discovers that LEAP is in use on a network using
WPA. What recommendation should Jim make? - ✔ ✔ Use an alternate protocol like PEAP or EAP-
TLS and implement WPA2 if supported.
Gordon is concerned about the possibility that hackers may be able to use the Van Eck radiation
phenomenon to remotely read the contents of computer monitors in his facility. What technology
would protect against this type of attack? - ✔ ✔ TEMPEST
Harry would like to access a document owned by Sally and stored on a file server. Applying the
subject/object model to this scenario, who or what is the subject of the resource request? - ✔ ✔
Harry
Harry's request to write to the data file is blocked. Harry has a Secret security clearance, and the data
file has a Confidential classification. What principle of the Bell-LaPadula model blocked this request? - ✔
✔ *-Security Property
Helen is a software engineer and is developing code that she would like to restrict to running within an
isolated sandbox for security purposes. What software development technique is Helen using? - ✔ ✔
Confinement
If Susan's organization requires her to log in with her username, a PIN, a password, and a retina scan,
how many distinct authentication factor types has she used? - ✔ ✔ 2
In her role as an information security professional, Susan has been asked to identify areas where her
organization's wireless network may be accessible even though it isn't intended to be. What should
Susan do to determine where her organization's wireless network is accessible? - ✔ ✔ A site survey
IP addresses like 10.10.10.10 and 172.19.24.21 are both examples of what type of IP address? - ✔ ✔
Private IP address
Jim wants to allow cloud-based applications to act on his behalf to access information from other sites.
Which of the following tools can allow that? - ✔ ✔ OAuth
Johnson Widgets strictly limits access to total sales volume information, classifying it as a competitive
secret. However, shipping clerks have unrestricted access to order records to facilitate transaction
completion. A shipping clerk recently pulled all of the individual sales records for a quarter and totaled
them up to determine the total sales volume. What type of attack occurred? - ✔ ✔ Aggregation
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jackline98. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.