ITN 263 Midterm Pt 1 | Questions with Verified Answers
14 keer bekeken 0 keer verkocht
Vak
ITN 263
Instelling
ITN 263
ITN 263 Midterm Pt 1 | Questions with Verified Answers Which of the following is described as "confidence in your expectation that others will act in your best interest"? Trust Estefan is a network professional for an e-commerce company. The chief information officer (CIO) wants the customer web ...
Which of the following is described as "confidence in your expectation that others will
act in your best interest"?
Trust
Estefan is a network professional for an e-commerce company. The chief information
officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per
year to 30 seconds per year. The change should occur over the next 6 months. Which
security objective must Estefan employ to accomplish this goal?
Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability
software patch management to maintain security and integrity. Which IT infrastructure
domain is she protecting?
Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary
focus?
In a collection of servers and virtualized systems, defending both data and server
computing power
Which of the following must be done first to accomplish an organization's security
goals?
Write down security goals.
Temika is the IT security officer for her company. The CIO has told her that network
security success is not about preventing all possible attacks or compromises. Of the
following, what goal or accomplishment should she work toward?
Continually improving the state of security so that, as time passes, the network is better
protected than it was in the past
Which of the following roles is most commonly responsible for observing system and
user activity, looking for violations, trends towards bottlenecks, and attempts to perform
violations?
Auditor
A company has discovered that confidential business information has been repeatedly
acquired by a competitor over the past six months. The IT security team has been
unable to find the leaks. The team suspects a form of side-channel eavesdropping may
be involved. What is the suspected hacking method?
The competitor is using a phreaking attack
, As part of the bring your own device (BYOD) program, the company CIO is encouraging
employees to use their personal devices for business purposes. However, an attacker
with the right kind of antenna can access the wireless network from a great distance,
putting internal assets at risk. Of the following, what is the best solution?
Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and monitoring,
provides the best defense against what kind of attack?
Zero-day exploit
Which of the following is considered a node?
Networked printer
You are setting up a small home network. You want all devices to communicate with
each other. You assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the
devices. What processes must still be configured so that these nodes can communicate
with the Internet?
Both network address translation (NAT) and port address translation (PAT) must be
enabled to allow private network addresses to be translated to a random external port
and public IP address.
Many company employees work from home on a full-time basis. What technology do
they commonly use to communicate securely with the organization's network?
Virtual private network (VPN)
A major U.S. online retailer has discovered that thousands of purchases have been paid
for by stolen credit card numbers. An initial analysis of the location of the buyers reveals
IP addresses from within the United States. Upon further investigation, it is found that
the actual origin point of the fraudulent buyer is a series of IP addresses located in Asia.
What technology is the fraudster using?
Proxy server
You are a network professional. You want to overcome the security shortcomings of the
Domain Name System (DNS). Of the following, what is one of those shortcomings?
Use of a plaintext communication
Mel is working from home and speaking with her department manager on a Voice over
IP (VoIP) phone connection. This technology allows telephone conversations to be
routed over the Internet. During a VoIP conversation, Mei loses a few moments of what
the manager has said to her. What is the problem?
The OSI model Transport Layer was unable to guarantee reliable packet delivery.
Which OSI model layer deals with frames?
Data Link Layer
Which form of firewall filtering is NOT as clear or distinct as other types?
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Bri254. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €17,57. Je zit daarna nergens aan vast.