Computer Science > EXAM > ITN 263 Midterm Pt 1 | Questions with Verified Answers (All)
ITN 263 Midterm Pt 1 | Questions with Verified Answers Which of the following is described as "confidence in your expectation that others will act in your best interest"? Trust Estefan is a network ... professional for an e-commerce company. The chief information officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. The change should occur over the next 6 months. Which security objective must Estefan employ to accomplish this goal? Availability Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability software patch management to maintain security and integrity. Which IT infrastructure domain is she protecting? Workstation Domain To secure the System/Application Domain of an IT infrastructure, what is the primary focus? In a collection of servers and virtualized systems, defending both data and server computing power Which of the following must be done first to accomplish an organization's security goals? Write down security goals. Temika is the IT security officer for her company. The CIO has told her that network security success is not about preventing all possible attacks or compromises. Of the following, what goal or accomplishment should she work toward? Continually improving the state of security so that, as time passes, the network is better protected than it was in the past Which of the following roles is most commonly responsible for observing system and user activity, looking for violations, trends towards bottlenecks, and attempts to perform violations? Auditor A company has discovered that confidential business information has been repeatedly acquired by a competitor over the past six months. The IT security team has been unable to find the leaks. The team suspects a form of side-channel eavesdropping may be involved. What is the suspected hacking method? The competitor is using a phreaking attack As part of the bring your own device (BYOD) program, the company CIO is encouraging employees to use their personal devices for business purposes. However, an attacker with the right kind of antenna can access the wireless network from a great distance, putting internal assets at risk. Of the following, what is the best solution? Physically isolate wireless access from the wired network. A combination of intrusion detection and prevention, as well as logging and monitoring, provides the best defense against what kind of attack? Zero-day exploit Which of the following is considered a node? Networked printer You are setting up a small home network. You want all devices to communicate with each other. You assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the devices. What processes must still be configured so that these nodes can communicate with the Internet? Both network address translation (NAT) and port address translation (PAT) must be enabled to allow private network addresses to be translated to a random external port and public IP address. Many company employees work from home on a full-time basis. What technology do they commonly use to communicate securely with the organization's network? Virtual private network (VPN) A major U.S. online retailer has discovered that thousands of purchases have been paid for by stolen credit card numbers. An initial analysis of the location of the buyers reveals IP addresses from within the United States. Upon further investigation, it is found that the actual origin point of the fraudulent buyer is a series of IP addresses located in Asia. What technology is the fraudster using? Proxy server You are a network professional. You want to overcome the security shortcomings of the Domain Name System (DNS). Of the following, what is one of those shortcomings? Use of a plaintext communication Mel is working from home and speaking with her department manager on a Voice over IP (VoIP) phone connection. This technology allows telephone conversations to be routed over the Internet. During a VoIP conversation, Mei loses a few moments of what the manager has said to her. What is the problem? The OSI model Transport Layer was unable to guarantee reliable packet delivery. Which OSI model layer deals with frames? Data Link Layer Which form of firewall filtering is NOT as clear or distinct as other types? Filtering on whether an address is real or spoofed Which network security technology can block or restrict access if a computer does NOT have the latest antivirus update, a certain security patch, or a host firewall? Network access control (NAC) Which network index technology allows users to locate resources on a private network, keeps track of which servers and clients are online, and identifies the resources that network hosts share? Directory services In terms of networking, permission is the abilities granted on the network. False In terms of networking, privilege is the authorization to access an asset. False Determining who or what is trustworthy on a network is an ongoing activity. True Security objectives are goals that an organization strives to achieve through its security efforts. True Integrity is the protection against unauthorized access, while providing authorized users access to resources without obstruction. False Authentication is the proof or verification of a user's identity before granting access to a secured area. True Nonrepudiation is the security principle that prevents a user from being able to deny having performed an action. True Authorization is also known as access control. True The User Domain of an IT infrastructure refers to actual users, whether they are employees, consultants, contractors, or other third-party users. True The LAN Domain of an IT infrastructure includes routers, firewalls, and switches. False The WAN Domain of an IT infrastructure includes networks owned by a teclo or a carrier network company that leases access to corporations. True In any organization, network administrators have the ultimate and final responsibility for security. False Wireless networks are more secure than wired networks. False Information leakage often stems from malicious employees. True Zero-day exploits are new and previously unknown attacks for which no current specific defenses exist. True Whitelisting blocks the execution of any program not on the approved list. True A Media Access Control (MAC) address is the 48-bit physical hardware address of a network interface card (NIC) assigned by the manufacturer. True Hardening is the process of securing or locking down a host against threats and attacks. True Caching is a data storage mechanism that keeps a local copy of content that is fairly static in nature. True RFC 1918 addresses are for use only in private networks. True A company's cybersecurity trainer is recording a Lunch and Learn video for new employees. The trainer discusses the dangers of spam. Besides being annoying, what other problem could spam cause? A spam email could contain a link to what appears as a benign or beneficial website that could, if clicked, upload malicious software to eh user's computer. A malicious person has installed ransomware on a company user's computer. The ransomware message states that the malicious software will be removed if the user pays a certain amount of money digitally. What is a typical form of payment? Cryptocurrency A bank's online infrastructure has been under attack by hackers, In addition to standard security methods, the bank's IT security manager has requested website code to be examined and modified, where necessary, to address possible arbitrary code execution. What will the code modifications prevent? Buffer overflows Which type of hacker is a criminal whose career objective is to compromise IT infrastructures? Professional The IT security officer for a large company has spent the past year upgrading security for the corporate network. Employees working from home have personal firewalls running on their computers. They use a virtual private network (VPN) to connect to the corporate network. The corporate network utilizes the latest devices and techniques, including an intrusion detection system/intrusion prevention system (IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still needs to be addressed? An internal threat, such as a disgruntled employee or contractor A major social networking site has been hacked. The usernames, passwords, and security questions of more than 500 million users were compromised. The company disclosed the breach to all users, advising them to immediately change their passwords and security questions. The vulnerability that lead to the breach has been discovered and patched. However, the security engineer suspects there is still a problem left unaddressed. What is the most likely problem? The hackers may have left malicious tools within the network that will allow them continued access. An IT infrastructure manager is reviewing the company's computer assets, particularly the mean time to failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the company states that the MTTF is approximately 11 years. Because servers and some high-priority workstations must operate continuously except for brief periods of maintenance, how many hours, on average, can these hard drives be expected to operate before failure? More than 90,000 hours A chief information officer (CIO) works for a mid-sized company located on the California cost. The CIO is developing a disaster plan for the IT infrastructure in the event of an earthquake powerful enough to damage or destroy network and computing equipment, including the database servers. What can she do to protect valuable company data even under the worst circumstances? Have the data regularly backed up and stored in a secure, off-site facility not prone to such environmental dangers. A company's IT security engineer has notices several employees periodically checking their social media accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the engineer casually observes one user about to click a link to view a video, she stops the worker. Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts be blocked, and that only online training videos authorized by the company be allowed to be viewed. What threat is the IT security engineer concerned about? Trojan horse A chief financial officer's (CFO's) business account has been leaked onto the Internet, including the CFO's username, password, and financial data. The firm's security manager scanned the CFO's computer for viruses, which was clean. However, the manager is still convinced that the CFO's computer is somehow compromised, allowing whatever is typed to be disclosed. The manager recalls that six weeks ago, the CFO's assistant was caught illicitly accessing secure financial files and was subsequently dismissed. What is the likely problem? Hardware keystroke logger In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved? Less than 1,000 feet A mid-sized company's IT security engineer is attempting to make it more difficult for the company's wireless network to be compromised. She is using techniques such as random challenge-response dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-based encryption. What form of wireless attack is she defending against? Replay Several times this week, the IT infrastructure chief of a small company has suspected that wireless communications sessions have been intercepted. After investigating, he believes some form of insertion attack is happening. He is considering encrypted communications and preconfigured network access as a defense. What type of insertion attack is suspected? Rogue device insertion Which fragmentation attack results in full or partial overwriting of datagram components? Overlap The imitation of source email, Internet Protocol (IP), or Media Access Control (MAC) addresses is part of which type of attack? Spoofing Which of the following is a feature of NTFS that allows complete additional files to successfully hide beneath any normal file object and be almost undetectable? Alternate Data Streams (ADS) [Show More]
Last updated: 10 months ago
Preview 4 out of 12 pages
Loading document previews ...
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
ITN 263 MIDTERM EXAMS BUNDLE
By Ajay25 10 months ago
$30
3
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 04, 2024
Number of pages
12
Written in
This document has been written for:
Uploaded
Aug 04, 2024
Downloads
0
Views
36
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·