ITN 263 Midterm Exam | Questions and Answers (Complete Solutions)
15 keer bekeken 0 keer verkocht
Vak
ITN 263
Instelling
ITN 263
ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) Who performs penetration testing? ethical hackers Which type of backup solution typically stores your data on another organization's hardware, making you dependent on their security, confidentiality assurance, and reliability? Clou...
Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability?
Cloud
An Access Control List (ACL) is an example of which of the following?
logical security
A security assessment may include which of the following steps?
perform a risk assessment
perform penetration testing
perform vulnerability scanning
Which of the following is a method of trapping hackers and detecting new attacks?
Honeypot
What is not an example of containment during incident response?
confirming a breach
Which of the following is an example of multi-factor authentication? Choose the best
answer.
a user accesses the server (login) with a username, password, and RSA token card
The best practice of 'use default deny over default permit' can be applied to which of the
following system? Choose the best answer.
Firewalls
What is the purpose of the post-mortem review after a security assessment?
learn from mistakes
What is another form of a honeypot?
padded cell
Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________.
separation of duties
,Window locks, door locks, and security cameras are examples of which of the
following?
physical security
One of the most effective preventative techniques in network security troubleshooting is
__________.
installing patches and updates
Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________.
principle of least privilege
Which of the following is an example of multi-factor authentication? choose the best
answer.
a bank ATM card and a pin number
Which of the following must an administrator organize to ensure follow-through of a new
security plan?
end-user training and awareness
Which of the following is not a network security management best practice?
implement single-factor authentication
Which of the following could compromise network security?
simplify by assigning maximum required permissions
Giving network users enough permissions to do their job is an example of , is an
example of __________.
least privilege
What is a potential disadvantage of online data backups?
dependency on provider's security
Which of the following helps avoid single points of failure by building in multiple
elements, pathways, or methods of accomplishing mission-critical tasks?
Redundancy
Using a fingerprint to unlock a workstation is an example of which of the following?
something you are
Which entity is responsible for global coordination of IP addressing?
Internet Assigned Numbers Authority (IANA)
What is accomplished with IP addressing?
Traffic management through routing
Traffic filtering
, Hardening is the process of reducing the _________ of a potential target by removing
unnecessary components and adding protections.
attack surface
Which of the following is the best reason you might switch from IPv4 to IPv6 as your
primary network protocol?
Security
Which IT domain marks the boundary where the private network meets the public
network?
LAN-to-WAN domain
Uninstalling all unnecessary applications and services on a user system is an example
of system hardening. In which IT domain is client system hardening typically applied?
Workstation Domain
Logging the time a user accessed a particular resource is an example of which of the
following?
Accounting
What employs routing protocols to exchange information about routes and connected
pathways? This information calculates the best path to guide a packet towards its
destination.
Router
The address range 192.168.0.0-192.168.255.255/16 is an example of which of the
following?
Class C
What is defined as any device on a network, even those without an IP address?
Node
Bus, tree, and mesh are types of __________.
network topologies
Why might you develop an acceptable use policy?
to establish network usage rules
When selecting networking equipment, which of the following is not a desirable feature
from a security perspective?
easy power switch
The principle of least privilege is often a good guideline as to appropriate ___________
settings.
authorization
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Bri254. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €20,18. Je zit daarna nergens aan vast.