IS 305 Midterm Exam | Complete Solutions (Verified)
12 keer bekeken 0 keer verkocht
Vak
IS 305
Instelling
IS 305
IS 305 Midterm Exam | Complete Solutions (Verified) The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand. True The type of hacking that involves breaking into telephone systems is called sneaking. False The technique for br...
The Domain Name Service is what translates human-readable domain names into IP
addresses that computers and routers understand.
True
The type of hacking that involves breaking into telephone systems is called sneaking.
False
The technique for breaching a system's security by exploiting human nature rather than
technology is war-driving.
False
Malware is a generic term for software that has a malicious purpose.
True
Software that lays dormant until some specific condition is met is a Trojan horse.
False
Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True
Auditing is the process to determine if a user's credentials are authorized to access a
network resource.
False
Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True
The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False
The SANS Institute website is a vast repository of security-related documentation.
True
In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
Denial of Service
Your company is instituting a new security awareness program. You are responsible for
educating end users on a variety of threats, including social engineering. Which of the
following best defines social engineering?
,Using people skills to obtain proprietary information
Which type of hacking occurs when the attacker monitors an authenticated session
between the client and the server and takes over that session?
Session hijacking
Someone who finds a flaw in a system and reports that flaw to the vendor of the system
is a __________.
White hat hacker
Someone who gains access to a system and causes harm is a __________?
Black hat hacker
A black hat hacker is also called a ___________
Cracker
Someone who calls himself a hacker but lacks the expertise is a ________.
Script kiddy
Someone who legally breaks into a system to assess security deficiencies is a
________.
Penetration tester
A(n) ______ is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
Firewall
A(n) hides the internal network's IP address and presents a single IP address to the
outside world.
Proxy server
Which one of these is NOT one the three pillars of security in the CIA triangle?
Authentication
Which of these is the process to determine if the credentials given by a user or another
system are authorized to access the network resource in question?
Authentication
Which of these is a repository of security-related documentation and also sponsors a
number of security research projects?
SANS Institute
Which of these was the first computer incident-response team?
Computer Emergency Response Team
Which of these is a repository for detailed information on virus outbreaks?
, F-Secure
The notation used to perform variable-length subnet masking for IP addresses is CIDR.
True
The name you type into a browser's address bar, such as www.microsoft.com, is known
as the IP locator.
False
The IP command-line command to determine your computer's IP address, subnet mask,
and default gateway is ping.
False
The IP command-line command to determine the number of hops it takes to get from
your computer to its destination is ping.
False
No protocols operate at the physical layer of the OSI model.
True
The session layer of the OSI model provides the mechanism to manage the dialogue
between end-user application processes.
True
The TCP protocol works at the network layer of the OSI model.
False
MAC addresses are unique addresses for each NIC.
True
The first four bytes of the MAC address identify the vendor.
False
A host is a machine with data on it, to which you can connect.
True
Unshielded twisted-pair cable capable with a specification of 100 MHz/100 Mbps is also
called Category ________.
5
Which device can connect many computers and sends packets out every port?
Hub
Which device is used to boost a signal?
Repeater
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Bri254. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €18,28. Je zit daarna nergens aan vast.