Itn 261 - Study guides, Class notes & Summaries

Looking for the best study guides, study notes and summaries about Itn 261? On this page you'll find 15 study documents about Itn 261.

All 15 results

Sort by

ITN 261 Quiz 2 Questions with All Correct Answers
  • ITN 261 Quiz 2 Questions with All Correct Answers

  • Exam (elaborations) • 14 pages • 2024
  • Available in package deal
  • ITN 261 Quiz 2 Questions with All Correct Answers Which of the following types of viruses is designed to change its code and "shape" to avoid detection by virus scanners, which would look for a specific virus code and not the new version? - Answer- Polymorphic virus Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs? - Answer- Logic bomb Which of the following types of viruses infects using mul...
    (0)
  • $12.99
  • + learn more
ITN 261 FINAL TEST QUESTIONS AND ANSWERS (ALREADY GRADED A+)
  • ITN 261 FINAL TEST QUESTIONS AND ANSWERS (ALREADY GRADED A+)

  • Exam (elaborations) • 12 pages • 2024
  • Available in package deal
  • ITN 261 FINAL TEST QUESTIONS AND ANSWERS (ALREADY GRADED A+) Which of the following is a piece of code or software designed to lie in wait on a system until a specified event occurs? A. Logic bomb B. Scareware C. Hoax D. Virus - Answer- A. Logic bomb Which of the following is a piece of code or software that spreads from system to system by attaching itself to other files? A. Logic bomb B. Scareware C. Hoax D. Virus - Answer- D. Virus Which of the followi...
    (0)
  • $10.99
  • + learn more
ITN 261 - Mid-Term Correct Answers 2024/2025 Update
  • ITN 261 - Mid-Term Correct Answers 2024/2025 Update

  • Exam (elaborations) • 22 pages • 2024
  • ITN 261 - Mid-Term Correct Answers 2024/2025 Update
    (0)
  • $15.49
  • + learn more
ITN 261 Final Questions and answers 2024/2025 update
  • ITN 261 Final Questions and answers 2024/2025 update

  • Exam (elaborations) • 21 pages • 2024
  • ITN 261 Final Questions and answers 2024/2025 update
    (0)
  • $14.99
  • + learn more
 ITN 261 Midterm Exam Questions with 100% Correct Answers New Update
  • ITN 261 Midterm Exam Questions with 100% Correct Answers New Update

  • Exam (elaborations) • 11 pages • 2024
  • Available in package deal
  • ITN 261 Midterm Exam Questions with 100% Correct Answers New Update A bollard is used as a physical security control against which of the following? A. Humans B. Automobiles C. Automatic weapons D. Natural disasters - Answer- B. Automobiles When choosing between guards and dogs for physical, which of the following factors must be considered? A. Liability B. Discernment C. Dual role D. Multifunction - Answer- B. Discernment CCTV can be used as which of ...
    (0)
  • $12.49
  • + learn more
ITN 261 EXAM QUESTIONS WITH ALL CORRECT ANSWERS
  • ITN 261 EXAM QUESTIONS WITH ALL CORRECT ANSWERS

  • Exam (elaborations) • 7 pages • 2024
  • Available in package deal
  • ITN 261 EXAM QUESTIONS WITH ALL CORRECT ANSWERS Which of the following involves overwriting all of the information on a drive? - Answer- Drive wiping The first step in penetration testing is to actually perform the attack. - Answer- False Which of the following is a distributed denial of service (DDoS) attack in which the attacker sends a succession of SYN packets with a spoofed return address to a targeted destination IP device, but does not send the last ACK packet to acknowledge and ...
    (0)
  • $13.49
  • + learn more
ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS 2024 NEW UPDATE
  • ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS 2024 NEW UPDATE

  • Exam (elaborations) • 7 pages • 2024
  • Available in package deal
  • ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS 2024 NEW UPDATE What are the typical steps in a penetration test? - Answer- 1. Planning and scoping 2. Reconnaissance 3. Scanning 4. Gaining access 5. Maintaining access 6. Analysis and reporting What is the difference between open source and closed source software? - Answer- Open Source: Source code is available for anyone to view, modify, and distribute. Closed Source: Source code is not available to the public; only the original creators c...
    (0)
  • $12.99
  • + learn more
ITN 261 FINAL EXAM QUESTIONS WITH ALL CORRECT ANSWERS NEW UPDATE (ALREADY GRADED A+)
  • ITN 261 FINAL EXAM QUESTIONS WITH ALL CORRECT ANSWERS NEW UPDATE (ALREADY GRADED A+)

  • Exam (elaborations) • 7 pages • 2024
  • Available in package deal
  • ITN 261 FINAL EXAM QUESTIONS WITH ALL CORRECT ANSWERS NEW UPDATE (ALREADY GRADED A+) Which type of scan is the most reliable but also the easiest to detect? - Answer- TCP connect scan A form of offline attack that functions much like a dictionary attack, but with an extra level of sophistication, is a: - Answer- hybrid attack. Active@ and Trinity Rescue Kit are examples of: - Answer- tools used to change passwords An attacker can deprive the system owner of the ability to detect the ac...
    (0)
  • $13.49
  • + learn more
ITN 261 Chapter 5 Exam Questions with Correct Detailed Answers (Verified Answers) Graded A+
  • ITN 261 Chapter 5 Exam Questions with Correct Detailed Answers (Verified Answers) Graded A+

  • Exam (elaborations) • 7 pages • 2024
  • Available in package deal
  • ITN 261 Chapter 5 Exam Questions with Correct Detailed Answers (Verified Answers) Graded A+ Which of these may be considered worst practice when it comes to vulnerability scans? 1. Scanning production servers 2. Notifying operations staff ahead of time 3. Taking no action on the results 4. Using limited details in your scan reports - Answer- 3. Taking no action on the results You would be expected to scan production servers, since that would be where you would be most interested to fin...
    (0)
  • $12.99
  • + learn more
ITN 261 FINAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS)
  • ITN 261 FINAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS)

  • Exam (elaborations) • 4 pages • 2024
  • Available in package deal
  • ITN 261 FINAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) Which of the following is part of the account management life cycle? - Answer- account provisioning Which of the following activities best describes the act of a person rummaging through a trash container looking for sensitive information? - Answer- dumpster diving What are two common ports used to connect to a web server? - Answer- port 80 and 8080 When considering the risks of local storage vs third party cloud sto...
    (0)
  • $12.99
  • + learn more