100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
IS 305 Midterm Exam | Complete Solutions (Verified) €18,28   In winkelwagen

Tentamen (uitwerkingen)

IS 305 Midterm Exam | Complete Solutions (Verified)

 12 keer bekeken  0 keer verkocht
  • Vak
  • IS 305
  • Instelling
  • IS 305

IS 305 Midterm Exam | Complete Solutions (Verified) The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand. True The type of hacking that involves breaking into telephone systems is called sneaking. False The technique for br...

[Meer zien]

Voorbeeld 3 van de 17  pagina's

  • 29 augustus 2024
  • 17
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • IS 305
  • IS 305
avatar-seller
IS 305 Midterm Exam


The Domain Name Service is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

The type of hacking that involves breaking into telephone systems is called sneaking.
False

The technique for breaching a system's security by exploiting human nature rather than
technology is war-driving.
False

Malware is a generic term for software that has a malicious purpose.
True

Software that lays dormant until some specific condition is met is a Trojan horse.
False

Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True

Auditing is the process to determine if a user's credentials are authorized to access a
network resource.
False

Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True

The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False

The SANS Institute website is a vast repository of security-related documentation.
True

In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
Denial of Service

Your company is instituting a new security awareness program. You are responsible for
educating end users on a variety of threats, including social engineering. Which of the
following best defines social engineering?

,Using people skills to obtain proprietary information

Which type of hacking occurs when the attacker monitors an authenticated session
between the client and the server and takes over that session?
Session hijacking

Someone who finds a flaw in a system and reports that flaw to the vendor of the system
is a __________.
White hat hacker

Someone who gains access to a system and causes harm is a __________?
Black hat hacker

A black hat hacker is also called a ___________
Cracker

Someone who calls himself a hacker but lacks the expertise is a ________.
Script kiddy

Someone who legally breaks into a system to assess security deficiencies is a
________.
Penetration tester

A(n) ______ is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
Firewall

A(n) hides the internal network's IP address and presents a single IP address to the
outside world.
Proxy server

Which one of these is NOT one the three pillars of security in the CIA triangle?
Authentication

Which of these is the process to determine if the credentials given by a user or another
system are authorized to access the network resource in question?
Authentication

Which of these is a repository of security-related documentation and also sponsors a
number of security research projects?
SANS Institute

Which of these was the first computer incident-response team?
Computer Emergency Response Team

Which of these is a repository for detailed information on virus outbreaks?

, F-Secure

The notation used to perform variable-length subnet masking for IP addresses is CIDR.
True

The name you type into a browser's address bar, such as www.microsoft.com, is known
as the IP locator.
False

The IP command-line command to determine your computer's IP address, subnet mask,
and default gateway is ping.
False

The IP command-line command to determine the number of hops it takes to get from
your computer to its destination is ping.
False

No protocols operate at the physical layer of the OSI model.
True

The session layer of the OSI model provides the mechanism to manage the dialogue
between end-user application processes.
True

The TCP protocol works at the network layer of the OSI model.
False

MAC addresses are unique addresses for each NIC.
True

The first four bytes of the MAC address identify the vendor.
False

A host is a machine with data on it, to which you can connect.
True

Unshielded twisted-pair cable capable with a specification of 100 MHz/100 Mbps is also
called Category ________.
5

Which device can connect many computers and sends packets out every port?
Hub

Which device is used to boost a signal?
Repeater

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Bri254. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €18,28. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67474 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€18,28
  • (0)
  Kopen