ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)
5 keer bekeken 0 keer verkocht
Vak
ITN266
Instelling
ITN266
ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)
For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acce...
ITN266 MIDTERM EXAM QUESTIONS
AND CORRECT ANSWERS NEW
UPDATE (GRADED A+)
For watch lists of criminals, a false ________ means that an innocent person is
identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acceptance
For computer access, a false ________ means that a legitimate user is denied access
to a resource.
a. Neither rejection nor acceptance
b. rejection
c. acceptance
d. Both rejection and acceptance - Answer- b. rejection
CAs distribute public keys ________.
a. in digital certificates
b. only in ways using encryption for confidentiality
c. Both in digital certificates and only in ways using encryption for confidentiality
d. Neither in digital certificates nor only in ways using encryption for confidentiality -
Answer- a. in digital certificates
In Kerberos, the ________ is an encrypted session key that only the verifier can
decrypt.
a. Both ticket granting ticket and service ticket
b. ticket granting ticket
c. Neither ticket granting ticket nor service ticket
d. service ticket - Answer- d. service ticket
The most widely used form of biometrics is ________.
a. retinal scanning
b. fingerprint scanning
c. face recognition
d. iris scanning - Answer- b. fingerprint scanning
,________ allows for very recent file changes to be restored.
a. File backup
b. File/folder backup
c. Shadowing
d. Image backup - Answer- c. Shadowing
Wiped data can be read.
a. True
b. False - Answer- b. False
The most common form of deletion in Windows-based systems is nominal deletion.
a. True
b. False - Answer- a. True
Another name for RAID 1 is ________.
a. Mirroring
b. Striping
c. None of these
d. Distributed Parity - Answer- a. Mirroring
Image backup is a fast form of backups.
a. True
b. False - Answer- b. False
DDL triggers are used to ________.
a. produce automatic responses if the structure of the database has been altered
b. maliciously attack databases
c. Both maliciously attack databases and produce automatic responses if the structure
of the database has been altered
d. Neither maliciously attack databases nor produce automatic responses if the
structure of the database has been altered - Answer- a. produce automatic responses if
the structure of the database has been altered
With RAID 1, the following is achieved ________.
a. Both Redundancy and Striping
b. Neither Redundancy nor Striping
c. Striping
d. Redundancy - Answer- d. Redundancy
Using the delete key prevents data from being easily recovered.
a. True
b. False - Answer- b. False
To find out who is sending trade secrets out of the firm, you can use ________.
a. None of these
b. data extrusion management
,c. watermarking
d. DRM - Answer- c. watermarking
After destroying, data is ________.
a. recoverable
b. Both recoverable and reusable
c. Neither recoverable nor reusable
d. reusable - Answer- c. Neither recoverable nor reusable
Normally, there is no limit on how long shadowing may maintain backed up files.
a. True
b. False - Answer- b. False
Companies usually conduct full backups on a ________ basis.
a. hourly
b. monthly
c. daily
d. weekly - Answer- d. weekly
Which of the following is considered a trade secret?
a. Product formulations
b. Trade names
c. Patents
d. Trademarks - Answer- a. Product formulations
Attackers in the Target data breach used malware and then used ______ or ______ to
infect a Target third party vendor.
a. spear phishing; sabotage
b. viruses; worms
c. spear phishing; a targeted phishing attack
d. hacking; sabotage - Answer- c. spear phishing; a targeted phishing attack
When a threat succeeds in causing harm to a business, this is known as a(n) ________.
a. CIA
b. unintended access
c. PII
d. breach - Answer- d. breach
What is Trojan.POSRAM in regard to Target's data breach?
a. Malware
b. A virus
c. Employee sabotage
d. A worm - Answer- a. Malware
Stolen information is commonly used for ________.
a. credit card fraud
, b. identity theft
c. false claims
d. data mismanagement - Answer- a. credit card fraud
You receive an e-mail that appears to come from a frequent customer. It contains
specific information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However,
the website is fake. This is an example of ________.
a. a hoax
b. phishing
c. spear phishing
d. social engineering - Answer- c. spear phishing
Credit card theft is also known as ________.
a. carding
b. click fraud
c. extortion
d. bug bounty - Answer- a. carding
A ________ is a small program that, after installed, downloads a larger attack program.
a. rootkit
b. keystroke logger
c. Trojan horse
d. downloader - Answer- d. downloader
Which of the following is NOT an indirect cost of a major data breach?
a. Abnormal customer turnover
b. Loss of reputation
c. Notification costs
d. Increased customer acquisition activities - Answer- c. Notification costs
________ consists of activities that violate a company's IT use and/or ethics policies.
a. Extortion
b. Abuse
c. Hacking
d. Fraud - Answer- b. Abuse
Which of the following is NOT a type of countermeasure?
a. Detective
b. Preventative
c. Corrective
d. Cyberwar - Answer- d. Cyberwar
________ programs reward researchers for finding vulnerabilities.
a. Black-market website
b. Transshipper
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €13,76. Je zit daarna nergens aan vast.