100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+ $12.99   Add to cart

Exam (elaborations)

ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+

 7 views  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+ Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to Moa's inbox on Tuesday. How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad Trojan is circulating and that he s...

[Show more]

Preview 2 out of 8  pages

  • October 10, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 260
  • ITN 260
avatar-seller
Scholarsstudyguide
ITN 260 EXAM QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) GRADED A+
Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to
Moa's inbox on Tuesday.

How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad
Trojan is circulating and that he should change his security settings.

Which of these items retrieved through dumpster diving would NOT provide useful
information? - Answer- books

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her
his password. What social engineering attack has Hedda performed? - Answer-
impersonation

Linnea's father called her to say that a message suddenly appeared on his screen that
says his software license has expired and he must immediately pay $500 to have it
renewed before control of the computer will be returned to him. What type of malware is
this? - Answer- blocking ransomware

Which of the following is defined as following an authorized person through a secure
door? - Answer- tailgating

Which variation of a phishing attack sends phishing messages only to wealthy
individuals? - Answer- Whaling

Which type of mutation completely changes a virus from its original form by rewriting its
own code whenever it is executed? - Answer- metamorphic

A watering hole attack is directed against which of the following? - Answer- a smaller
group of specific users

What is a characteristic of the Trusted Platform Module (TPM)? - Answer- It provides
cryptographic services in hardware instead of software

Which of these has an onboard key generator and key storage facility, as well as
accelerated symmetric and asymmetric encryption, and can back up sensitive material
in encrypted form? - Answer- Hardware Security Module (HSM)

, Illya was asked to recommend the most secure asymmetric cryptographic algorithm to
his supervisor. Which of the following did he choose? - Answer- SHA-2

Which of the following key exchanges uses the same keys each time? - Answer- Diffie-
Hellman (DH)

A(n) _____ is not decrypted but is only used for comparison purposes. - Answer- digest

Alyosha was explaining to a friend the importance of protecting a cryptographic key
from cryptoanalysis. He said that the key should not relate in a simple way to the cipher
text. Which protection is Alyosha describing? - Answer- confusion

What is the latest version of the Secure Hash Algorithm? - Answer- SHA-3

Egor wanted to use a digital signature. Which of the following benefits will the digital
signature not provide? - Answer- verify the receiver

The Hashed Message Authentication Code (HMAC) _____. - Answer- hashes the key
and the message

Proving that a user sent an email message is known as _____. - Answer- non-
repudiation

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet
was rotated 13 steps. What type of cipher is this? - Answer- ROT13

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
- Answer- plaintext

At a staff meeting one of the technicians suggested that the enterprise protect its new
web server by hiding it and not telling anyone where it is located. Iosif raised his hand
and said that security through obscurity was a poor idea. Why did he say that? -
Answer- It would be essentially impossible to keep its location a secret from everyone.

Which of these is NOT a basic security protection for information that cryptography can
provide? - Answer- risk loss

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his
coworker an example of adding two bits, 1 and 1. What is the result of this sum? -
Answer- 0

Which of these is the strongest symmetric cryptographic algorithm? - Answer-
Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message? - Answer- Alice's public key

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart