100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+) $14.49   Add to cart

Exam (elaborations)

ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)

 0 view  0 purchase
  • Course
  • ITN266
  • Institution
  • ITN266

ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+) For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal. a. acceptance b. rejection c. Neither acceptance nor rejection d. Both acceptance and rejection - Answer- a. acce...

[Show more]

Preview 4 out of 31  pages

  • October 10, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN266
  • ITN266
avatar-seller
Scholarsstudyguide
ITN266 MIDTERM EXAM QUESTIONS
AND CORRECT ANSWERS NEW
UPDATE (GRADED A+)

For watch lists of criminals, a false ________ means that an innocent person is
identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acceptance

For computer access, a false ________ means that a legitimate user is denied access
to a resource.
a. Neither rejection nor acceptance
b. rejection
c. acceptance
d. Both rejection and acceptance - Answer- b. rejection

CAs distribute public keys ________.
a. in digital certificates
b. only in ways using encryption for confidentiality
c. Both in digital certificates and only in ways using encryption for confidentiality
d. Neither in digital certificates nor only in ways using encryption for confidentiality -
Answer- a. in digital certificates

In Kerberos, the ________ is an encrypted session key that only the verifier can
decrypt.
a. Both ticket granting ticket and service ticket
b. ticket granting ticket
c. Neither ticket granting ticket nor service ticket
d. service ticket - Answer- d. service ticket

The most widely used form of biometrics is ________.
a. retinal scanning
b. fingerprint scanning
c. face recognition
d. iris scanning - Answer- b. fingerprint scanning

,________ allows for very recent file changes to be restored.
a. File backup
b. File/folder backup
c. Shadowing
d. Image backup - Answer- c. Shadowing

Wiped data can be read.
a. True
b. False - Answer- b. False

The most common form of deletion in Windows-based systems is nominal deletion.
a. True
b. False - Answer- a. True

Another name for RAID 1 is ________.
a. Mirroring
b. Striping
c. None of these
d. Distributed Parity - Answer- a. Mirroring

Image backup is a fast form of backups.
a. True
b. False - Answer- b. False

DDL triggers are used to ________.
a. produce automatic responses if the structure of the database has been altered
b. maliciously attack databases
c. Both maliciously attack databases and produce automatic responses if the structure
of the database has been altered
d. Neither maliciously attack databases nor produce automatic responses if the
structure of the database has been altered - Answer- a. produce automatic responses if
the structure of the database has been altered

With RAID 1, the following is achieved ________.
a. Both Redundancy and Striping
b. Neither Redundancy nor Striping
c. Striping
d. Redundancy - Answer- d. Redundancy

Using the delete key prevents data from being easily recovered.
a. True
b. False - Answer- b. False

To find out who is sending trade secrets out of the firm, you can use ________.
a. None of these
b. data extrusion management

,c. watermarking
d. DRM - Answer- c. watermarking

After destroying, data is ________.
a. recoverable
b. Both recoverable and reusable
c. Neither recoverable nor reusable
d. reusable - Answer- c. Neither recoverable nor reusable

Normally, there is no limit on how long shadowing may maintain backed up files.
a. True
b. False - Answer- b. False

Companies usually conduct full backups on a ________ basis.
a. hourly
b. monthly
c. daily
d. weekly - Answer- d. weekly


Which of the following is considered a trade secret?
a. Product formulations
b. Trade names
c. Patents
d. Trademarks - Answer- a. Product formulations

Attackers in the Target data breach used malware and then used ______ or ______ to
infect a Target third party vendor.
a. spear phishing; sabotage
b. viruses; worms
c. spear phishing; a targeted phishing attack
d. hacking; sabotage - Answer- c. spear phishing; a targeted phishing attack

When a threat succeeds in causing harm to a business, this is known as a(n) ________.
a. CIA
b. unintended access
c. PII
d. breach - Answer- d. breach

What is Trojan.POSRAM in regard to Target's data breach?
a. Malware
b. A virus
c. Employee sabotage
d. A worm - Answer- a. Malware

Stolen information is commonly used for ________.
a. credit card fraud

, b. identity theft
c. false claims
d. data mismanagement - Answer- a. credit card fraud

You receive an e-mail that appears to come from a frequent customer. It contains
specific information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However,
the website is fake. This is an example of ________.
a. a hoax
b. phishing
c. spear phishing
d. social engineering - Answer- c. spear phishing

Credit card theft is also known as ________.
a. carding
b. click fraud
c. extortion
d. bug bounty - Answer- a. carding

A ________ is a small program that, after installed, downloads a larger attack program.
a. rootkit
b. keystroke logger
c. Trojan horse
d. downloader - Answer- d. downloader

Which of the following is NOT an indirect cost of a major data breach?
a. Abnormal customer turnover
b. Loss of reputation
c. Notification costs
d. Increased customer acquisition activities - Answer- c. Notification costs

________ consists of activities that violate a company's IT use and/or ethics policies.
a. Extortion
b. Abuse
c. Hacking
d. Fraud - Answer- b. Abuse

Which of the following is NOT a type of countermeasure?
a. Detective
b. Preventative
c. Corrective
d. Cyberwar - Answer- d. Cyberwar

________ programs reward researchers for finding vulnerabilities.
a. Black-market website
b. Transshipper

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart