ITE302c – Full Exam Questions and Answers Graded A+
3 views 0 purchase
Course
ITE302c – Full
Institution
ITE302c – Full
ITE302c – Full Exam Questions and
Answers Graded A+
What is the primary role of a firewall in network security?
- To encrypt sensitive data
- To block unauthorized access to or from a private network
- To increase internet speed
- To backup data automatically
To block unauthorized acce...
ITE302c – Full Exam Questions and
Answers Graded A+
What is the primary role of a firewall in network security?
- To encrypt sensitive data
- To block unauthorized access to or from a private network
- To increase internet speed
- To backup data automatically
✔✔To block unauthorized access to or from a private network
Which type of malware is designed to replicate itself and spread to other computers?
- Spyware
- Virus
- Ransomware
- Trojan horse
✔✔Virus
What does the acronym VPN stand for?
- Virtual Private Network
1
,- Verified Personal Node
- Virtual Public Network
- Verified Private Network
✔✔Virtual Private Network
Which of the following is a benefit of cloud computing?
- Increased physical hardware costs
- Limited data access
- Scalability and flexibility
- Slower deployment times
✔✔Scalability and flexibility
In the context of data security, what does the principle of least privilege entail?
- Users should have the minimum level of access necessary to perform their job functions
- Users should have access to all data at all times
- Privileges should be granted based on seniority
- Only IT staff should have access to sensitive data
✔✔Users should have the minimum level of access necessary to perform their job functions
2
,Which of the following is a common method of social engineering?
- Phishing emails
- Firewalls
- Antivirus software
- Data encryption
✔✔Phishing emails
What is the main function of an intrusion detection system (IDS)?
- To back up data
- To detect and alert on potential security breaches
- To encrypt data in transit
- To manage user access
✔✔To detect and alert on potential security breaches
Which statement best describes two-factor authentication (2FA)?
- It requires two passwords
- It combines two different types of verification methods
3
, - It is only used for online banking
- It eliminates the need for a password
✔✔It combines two different types of verification methods
What is a common use of blockchain technology?
- Online shopping
- Cryptocurrencies
- Email communication
- Virtual reality applications
✔✔Cryptocurrencies
Which of the following describes a Denial of Service (DoS) attack?
- Gaining unauthorized access to data
- Overloading a server to make it unavailable
- Stealing sensitive information
- Spreading malware through email
✔✔Overloading a server to make it unavailable
4
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller StellarScores. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R232,86. You're not tied to anything after your purchase.