ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)
5 views 0 purchase
Course
ITN266
Institution
ITN266
ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)
For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acce...
ITN266 MIDTERM EXAM QUESTIONS
AND CORRECT ANSWERS NEW
UPDATE (GRADED A+)
For watch lists of criminals, a false ________ means that an innocent person is
identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acceptance
For computer access, a false ________ means that a legitimate user is denied access
to a resource.
a. Neither rejection nor acceptance
b. rejection
c. acceptance
d. Both rejection and acceptance - Answer- b. rejection
CAs distribute public keys ________.
a. in digital certificates
b. only in ways using encryption for confidentiality
c. Both in digital certificates and only in ways using encryption for confidentiality
d. Neither in digital certificates nor only in ways using encryption for confidentiality -
Answer- a. in digital certificates
In Kerberos, the ________ is an encrypted session key that only the verifier can
decrypt.
a. Both ticket granting ticket and service ticket
b. ticket granting ticket
c. Neither ticket granting ticket nor service ticket
d. service ticket - Answer- d. service ticket
The most widely used form of biometrics is ________.
a. retinal scanning
b. fingerprint scanning
c. face recognition
d. iris scanning - Answer- b. fingerprint scanning
,________ allows for very recent file changes to be restored.
a. File backup
b. File/folder backup
c. Shadowing
d. Image backup - Answer- c. Shadowing
Wiped data can be read.
a. True
b. False - Answer- b. False
The most common form of deletion in Windows-based systems is nominal deletion.
a. True
b. False - Answer- a. True
Another name for RAID 1 is ________.
a. Mirroring
b. Striping
c. None of these
d. Distributed Parity - Answer- a. Mirroring
Image backup is a fast form of backups.
a. True
b. False - Answer- b. False
DDL triggers are used to ________.
a. produce automatic responses if the structure of the database has been altered
b. maliciously attack databases
c. Both maliciously attack databases and produce automatic responses if the structure
of the database has been altered
d. Neither maliciously attack databases nor produce automatic responses if the
structure of the database has been altered - Answer- a. produce automatic responses if
the structure of the database has been altered
With RAID 1, the following is achieved ________.
a. Both Redundancy and Striping
b. Neither Redundancy nor Striping
c. Striping
d. Redundancy - Answer- d. Redundancy
Using the delete key prevents data from being easily recovered.
a. True
b. False - Answer- b. False
To find out who is sending trade secrets out of the firm, you can use ________.
a. None of these
b. data extrusion management
,c. watermarking
d. DRM - Answer- c. watermarking
After destroying, data is ________.
a. recoverable
b. Both recoverable and reusable
c. Neither recoverable nor reusable
d. reusable - Answer- c. Neither recoverable nor reusable
Normally, there is no limit on how long shadowing may maintain backed up files.
a. True
b. False - Answer- b. False
Companies usually conduct full backups on a ________ basis.
a. hourly
b. monthly
c. daily
d. weekly - Answer- d. weekly
Which of the following is considered a trade secret?
a. Product formulations
b. Trade names
c. Patents
d. Trademarks - Answer- a. Product formulations
Attackers in the Target data breach used malware and then used ______ or ______ to
infect a Target third party vendor.
a. spear phishing; sabotage
b. viruses; worms
c. spear phishing; a targeted phishing attack
d. hacking; sabotage - Answer- c. spear phishing; a targeted phishing attack
When a threat succeeds in causing harm to a business, this is known as a(n) ________.
a. CIA
b. unintended access
c. PII
d. breach - Answer- d. breach
What is Trojan.POSRAM in regard to Target's data breach?
a. Malware
b. A virus
c. Employee sabotage
d. A worm - Answer- a. Malware
Stolen information is commonly used for ________.
a. credit card fraud
, b. identity theft
c. false claims
d. data mismanagement - Answer- a. credit card fraud
You receive an e-mail that appears to come from a frequent customer. It contains
specific information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However,
the website is fake. This is an example of ________.
a. a hoax
b. phishing
c. spear phishing
d. social engineering - Answer- c. spear phishing
Credit card theft is also known as ________.
a. carding
b. click fraud
c. extortion
d. bug bounty - Answer- a. carding
A ________ is a small program that, after installed, downloads a larger attack program.
a. rootkit
b. keystroke logger
c. Trojan horse
d. downloader - Answer- d. downloader
Which of the following is NOT an indirect cost of a major data breach?
a. Abnormal customer turnover
b. Loss of reputation
c. Notification costs
d. Increased customer acquisition activities - Answer- c. Notification costs
________ consists of activities that violate a company's IT use and/or ethics policies.
a. Extortion
b. Abuse
c. Hacking
d. Fraud - Answer- b. Abuse
Which of the following is NOT a type of countermeasure?
a. Detective
b. Preventative
c. Corrective
d. Cyberwar - Answer- d. Cyberwar
________ programs reward researchers for finding vulnerabilities.
a. Black-market website
b. Transshipper
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.49. You're not tied to anything after your purchase.