100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) €20,18   In winkelwagen

Tentamen (uitwerkingen)

ITN 263 Midterm Exam | Questions and Answers (Complete Solutions)

 15 keer bekeken  0 keer verkocht
  • Vak
  • ITN 263
  • Instelling
  • ITN 263

ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) Who performs penetration testing? ethical hackers Which type of backup solution typically stores your data on another organization's hardware, making you dependent on their security, confidentiality assurance, and reliability? Clou...

[Meer zien]

Voorbeeld 3 van de 21  pagina's

  • 4 augustus 2024
  • 21
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ITN 263
  • ITN 263
avatar-seller
ITN 263 Midterm Exam


Who performs penetration testing?
ethical hackers

Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability?
Cloud

An Access Control List (ACL) is an example of which of the following?
logical security

A security assessment may include which of the following steps?
perform a risk assessment
perform penetration testing
perform vulnerability scanning

Which of the following is a method of trapping hackers and detecting new attacks?
Honeypot

What is not an example of containment during incident response?
confirming a breach

Which of the following is an example of multi-factor authentication? Choose the best
answer.
a user accesses the server (login) with a username, password, and RSA token card

The best practice of 'use default deny over default permit' can be applied to which of the
following system? Choose the best answer.
Firewalls

What is the purpose of the post-mortem review after a security assessment?
learn from mistakes

What is another form of a honeypot?
padded cell

Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________.
separation of duties

,Window locks, door locks, and security cameras are examples of which of the
following?
physical security

One of the most effective preventative techniques in network security troubleshooting is
__________.
installing patches and updates

Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________.
principle of least privilege

Which of the following is an example of multi-factor authentication? choose the best
answer.
a bank ATM card and a pin number

Which of the following must an administrator organize to ensure follow-through of a new
security plan?
end-user training and awareness

Which of the following is not a network security management best practice?
implement single-factor authentication

Which of the following could compromise network security?
simplify by assigning maximum required permissions

Giving network users enough permissions to do their job is an example of , is an
example of __________.
least privilege

What is a potential disadvantage of online data backups?
dependency on provider's security

Which of the following helps avoid single points of failure by building in multiple
elements, pathways, or methods of accomplishing mission-critical tasks?
Redundancy

Using a fingerprint to unlock a workstation is an example of which of the following?
something you are

Which entity is responsible for global coordination of IP addressing?
Internet Assigned Numbers Authority (IANA)

What is accomplished with IP addressing?
Traffic management through routing
Traffic filtering

, Hardening is the process of reducing the _________ of a potential target by removing
unnecessary components and adding protections.
attack surface

Which of the following is the best reason you might switch from IPv4 to IPv6 as your
primary network protocol?
Security

Which IT domain marks the boundary where the private network meets the public
network?
LAN-to-WAN domain

Uninstalling all unnecessary applications and services on a user system is an example
of system hardening. In which IT domain is client system hardening typically applied?
Workstation Domain

Logging the time a user accessed a particular resource is an example of which of the
following?
Accounting

What employs routing protocols to exchange information about routes and connected
pathways? This information calculates the best path to guide a packet towards its
destination.
Router

The address range 192.168.0.0-192.168.255.255/16 is an example of which of the
following?
Class C

What is defined as any device on a network, even those without an IP address?
Node

Bus, tree, and mesh are types of __________.
network topologies

Why might you develop an acceptable use policy?
to establish network usage rules

When selecting networking equipment, which of the following is not a desirable feature
from a security perspective?
easy power switch

The principle of least privilege is often a good guideline as to appropriate ___________
settings.
authorization

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Bri254. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €20,18. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67096 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen

Laatst bekeken door jou


€20,18
  • (0)
  Kopen