100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ITN260 FINAL EXAM REAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) A GRADE €14,73   In winkelwagen

Tentamen (uitwerkingen)

ITN260 FINAL EXAM REAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) A GRADE

 4 keer bekeken  0 keer verkocht
  • Vak
  • ITN260
  • Instelling
  • ITN260

ITN260 FINAL EXAM REAL EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) A GRADE Which of the following is a form of malware attack that uses specialized communication protocols? a. Keylogger b. Spyware c. Bot d. RAT - Answer d. RAT What is a risk to data when training a machine learni...

[Meer zien]

Voorbeeld 4 van de 32  pagina's

  • 10 oktober 2024
  • 32
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ITN260
  • ITN260
avatar-seller
ITN260 FINAL EXAM REAL EXAM
QUESTIONS AND CORRECT
ANSWERS (VERIFIED ANSWERS)
A GRADE

Which of the following is a form of malware attack that uses specialized communication
protocols?
a. Keylogger
b. Spyware
c. Bot
d. RAT - Answer ✔ d. RAT

What is a risk to data when training a machine learning (ML) application?
a. ML algorithm security
b. API attack on the device
c. Improper exception handling in the ML program
d. Tainted training data for machine learning - Answer ✔ d. Tainted training data for
machine learning

What does ransomware do to an endpoint device?
a. Ransomware infects the endpoint devices and launches attacks on the infected
endpoint and other devices connected to the network.
b. Ransomware gets accidentally installed in the endpoint device as software along with
other programs during the installation process. This happens when the user's
installation and download options are overlooked, thus affecting the user application
adversely.
c. Ransomware attacks the endpoint device without the consent of the user or the
device, discreetly collecting and transmitting information, causing harm to the end user
d. Ransomware attacks the endpoint device holding it hostage by preventing it from
functioning unless the user fulfills the ransom payment demanded. - Answer ✔ d.
Ransomware attacks the endpoint device holding it hostage by preventing it from
functioning unless the user fulfills the ransom payment demanded

William downloaded some free software to help him with photo editing. A few days later,
William noticed several personal photographs were modified and posted to various
social media pages with obscene comments. He also noticed that there were videos of

,him that were morphed and circulated on adult websites. The videos were obviously
taken using his webcam.
What should William do to fix his problem and prevent it from happening again in the
future?
a. William should run an antimalware program and scan for all known RATs, then
quarantine and remove the infected file(s). To prevent this in the future, he should only
download software from trusted websites.
b. William should disable his network devices, then run an antimalware program to scan
for keyloggers while his computer is not connected to the internet and delete all infected
files. To prevent this in the future, William should never download free software off the -
Answer ✔ a. William should run an antimalware program and scan for all known RATs,
then quaratnine and remove the infected file(s). To prevent this in the future, he should
only download software form trusted websites

While Andel is logging into his email through a browser, the login window disappears.
Andel attempts to log in again and is successful. Days later, he goes to log into his
email, and his attempt fails. He receives a message indicating that his username and/or
password are invalid.
What is Andel likely a victim of?
a. CSRF
b. RAT
c. Spyware
d. Keyloggers - Answer ✔ a. CSRF

What is another term commonly used to define cross-site request forgery (CSRF):
a. Server-side request forgery
b. Client-side request forgery
c. Cross-server request forgery
d. Client-server request forgery - Answer ✔ b. Client-side request forgery

Which of the following is an example of a request forgery malware?
a. Ransomware
b. CSRF
c. DLL injection
d. SQL injection - Answer ✔ b. CSRF

A few computers at a high-security software firm location have been compromised. The
threat actor took user videos, confidential information like bank account IDs and
passwords, email IDs and passwords, and computer screenshots. These confidential
data have been shared every three hours from the computers to the threat actor. Which
of the following is correct, based on the evaluation of the above observation?
a. This is a hardware keylogger attack, as video capture functionality and periodic
transfer of data are not possible with a software keylogger.
b. This is a software keylogger attack, as screenshots, video captures, and keystrokes
have been routinely monitored and periodically shared.

,c. This is a hardware keylogger attack; it is only periodically sharing the information and
is a manual transfer of information by a human agent.
d. This is a software keylogger attack, as it is sharing the information every three -
Answer ✔ b. This is a software keylogger attack, as screenshots, video captures, and
keystrokes have been routinely monitored and periodically shared

Natasha, a network security administrator for an online travel portal, noticed that her
website was the victim of an SQL injection. She decided to study the SQL queries to
find which one made this vulnerability in the database, and she noticed the following
SQL code piece executed on the database:
'whatever' AND email IS NULL;
What has been accessed by the attacker running this SQL injection?
a. The attacker accessed the entirety of email address data from all users in the
database.
b. The attacker has determined the names of different types of fields in the database.
c. The attacker accessed the data of specific users.
d. The attacker has used the SQL injection to delete the table in the database. - Answer
✔ b. The attacker has determined the names of different types of fields in the database

Shanise is an IT security professional for a large private bank. She got an alert that the
bank website received a funds transfer request that was correctly credentialed but
flagged as being out of the account owner's usual pattern. If the alert is correct, what
type of attack has likely occurred?
a. CSRF attack
b. XSS attack
c. SQL injection
d. Replay attack - Answer ✔ a. CSRF attack

What is the name of the process where a website validates user input before the
application uses the input?
a. Sanitizing
b. Tokening
c. Authorizing
d. Eliminating - Answer ✔ a. Sanitizing

What should be done when the information life cycle of the data collected by an
organization ends?
a. Destroy the data
b. Mask the data
c. Protect the data
d. Tokenize the data - Answer ✔ a. Destroy the data

In a security review meeting, you are asked to calculate the single loss expectancy
(SLE) of an enterprise building worth $100,000,000, 75% of which is likely to be
destroyed by a flood. Flood insurance data suggest that a severe flood is likely to occur
once every 100 years. Which formula should you use to calculate the SLE?

, a. 100,000,000 * 0.75/0.1
b. 100,000,000/100 * 0.75
c. 100,000,000 * 0.75
d. 100,000,000/0.75 * 100 - Answer ✔ c. 100,000,000 * 0.75

Which data category can be accessed by any curreny employee or contractor?
a. Critical
b. Proprietary
c. Confidential
d. PHI - Answer ✔ b. Proprietary

After reviewing the data collection procedures in your organization, a court ordered you
to issue a document that specifies how the organization uses the collected personal
information. This document must be displayed to the user before allowing them to share
personal data. Which of the following documents should you prepare?
a. Pseudo-anonymization
b. Privacy notice
c. Data minimization
d. Terms of agreement - Answer ✔ b. Privacy notice

How does pseudo-anonymization contribute to data privacy?
a. Pseduo-anonymization obfuscates sensitive data elements
b. Pseudo-anonymization stores whole data in encrypted form.
c. Pseudo-anonymization limits the collection of personal information.
d. Pseudo-anonymization ensures data remains within its borders. - Answer ✔ a.
Pseudo-anonymization obfuscates sensitive data elements

Which control discourages security violations before their occurrence?
a. Preventative control
b. Deterrent control
c. Compensating control
d. Corrective control - Answer ✔ b. Deterrent control

What does the end of service notice indicate?
a. The nondisclosure agreement with a service vendor has expired
b. The enterprise is halting the manufacturing of a product
c. The service-level agreement with a vendor has expired
d. The enterprise will no longer offer support services for a product - Answer ✔ d. The
enterprise will no longer offer support services for a product

The protection of which of the following data type is mandated by HIPAA?
a. Public data
b. Personally identifiable information
c. Health information
d. Proprietary data - Answer ✔ c. Health information

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €14,73. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67474 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€14,73
  • (0)
  Kopen