100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+) €13,76   In winkelwagen

Tentamen (uitwerkingen)

ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+)

 5 keer bekeken  0 keer verkocht
  • Vak
  • ITN266
  • Instelling
  • ITN266

ITN266 MIDTERM EXAM QUESTIONS AND CORRECT ANSWERS NEW UPDATE (GRADED A+) For watch lists of criminals, a false ________ means that an innocent person is identified as a criminal. a. acceptance b. rejection c. Neither acceptance nor rejection d. Both acceptance and rejection - Answer- a. acce...

[Meer zien]

Voorbeeld 4 van de 31  pagina's

  • 10 oktober 2024
  • 31
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • ITN266
  • ITN266
avatar-seller
ITN266 MIDTERM EXAM QUESTIONS
AND CORRECT ANSWERS NEW
UPDATE (GRADED A+)

For watch lists of criminals, a false ________ means that an innocent person is
identified as a criminal.
a. acceptance
b. rejection
c. Neither acceptance nor rejection
d. Both acceptance and rejection - Answer- a. acceptance

For computer access, a false ________ means that a legitimate user is denied access
to a resource.
a. Neither rejection nor acceptance
b. rejection
c. acceptance
d. Both rejection and acceptance - Answer- b. rejection

CAs distribute public keys ________.
a. in digital certificates
b. only in ways using encryption for confidentiality
c. Both in digital certificates and only in ways using encryption for confidentiality
d. Neither in digital certificates nor only in ways using encryption for confidentiality -
Answer- a. in digital certificates

In Kerberos, the ________ is an encrypted session key that only the verifier can
decrypt.
a. Both ticket granting ticket and service ticket
b. ticket granting ticket
c. Neither ticket granting ticket nor service ticket
d. service ticket - Answer- d. service ticket

The most widely used form of biometrics is ________.
a. retinal scanning
b. fingerprint scanning
c. face recognition
d. iris scanning - Answer- b. fingerprint scanning

,________ allows for very recent file changes to be restored.
a. File backup
b. File/folder backup
c. Shadowing
d. Image backup - Answer- c. Shadowing

Wiped data can be read.
a. True
b. False - Answer- b. False

The most common form of deletion in Windows-based systems is nominal deletion.
a. True
b. False - Answer- a. True

Another name for RAID 1 is ________.
a. Mirroring
b. Striping
c. None of these
d. Distributed Parity - Answer- a. Mirroring

Image backup is a fast form of backups.
a. True
b. False - Answer- b. False

DDL triggers are used to ________.
a. produce automatic responses if the structure of the database has been altered
b. maliciously attack databases
c. Both maliciously attack databases and produce automatic responses if the structure
of the database has been altered
d. Neither maliciously attack databases nor produce automatic responses if the
structure of the database has been altered - Answer- a. produce automatic responses if
the structure of the database has been altered

With RAID 1, the following is achieved ________.
a. Both Redundancy and Striping
b. Neither Redundancy nor Striping
c. Striping
d. Redundancy - Answer- d. Redundancy

Using the delete key prevents data from being easily recovered.
a. True
b. False - Answer- b. False

To find out who is sending trade secrets out of the firm, you can use ________.
a. None of these
b. data extrusion management

,c. watermarking
d. DRM - Answer- c. watermarking

After destroying, data is ________.
a. recoverable
b. Both recoverable and reusable
c. Neither recoverable nor reusable
d. reusable - Answer- c. Neither recoverable nor reusable

Normally, there is no limit on how long shadowing may maintain backed up files.
a. True
b. False - Answer- b. False

Companies usually conduct full backups on a ________ basis.
a. hourly
b. monthly
c. daily
d. weekly - Answer- d. weekly


Which of the following is considered a trade secret?
a. Product formulations
b. Trade names
c. Patents
d. Trademarks - Answer- a. Product formulations

Attackers in the Target data breach used malware and then used ______ or ______ to
infect a Target third party vendor.
a. spear phishing; sabotage
b. viruses; worms
c. spear phishing; a targeted phishing attack
d. hacking; sabotage - Answer- c. spear phishing; a targeted phishing attack

When a threat succeeds in causing harm to a business, this is known as a(n) ________.
a. CIA
b. unintended access
c. PII
d. breach - Answer- d. breach

What is Trojan.POSRAM in regard to Target's data breach?
a. Malware
b. A virus
c. Employee sabotage
d. A worm - Answer- a. Malware

Stolen information is commonly used for ________.
a. credit card fraud

, b. identity theft
c. false claims
d. data mismanagement - Answer- a. credit card fraud

You receive an e-mail that appears to come from a frequent customer. It contains
specific information about your relationship with the customer. Clicking on a link in the
message takes you to a website that seems to be your customer's website. However,
the website is fake. This is an example of ________.
a. a hoax
b. phishing
c. spear phishing
d. social engineering - Answer- c. spear phishing

Credit card theft is also known as ________.
a. carding
b. click fraud
c. extortion
d. bug bounty - Answer- a. carding

A ________ is a small program that, after installed, downloads a larger attack program.
a. rootkit
b. keystroke logger
c. Trojan horse
d. downloader - Answer- d. downloader

Which of the following is NOT an indirect cost of a major data breach?
a. Abnormal customer turnover
b. Loss of reputation
c. Notification costs
d. Increased customer acquisition activities - Answer- c. Notification costs

________ consists of activities that violate a company's IT use and/or ethics policies.
a. Extortion
b. Abuse
c. Hacking
d. Fraud - Answer- b. Abuse

Which of the following is NOT a type of countermeasure?
a. Detective
b. Preventative
c. Corrective
d. Cyberwar - Answer- d. Cyberwar

________ programs reward researchers for finding vulnerabilities.
a. Black-market website
b. Transshipper

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Scholarsstudyguide. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €13,76. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 84669 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€13,76
  • (0)
  Kopen