ITN 263 Midterm Exam | Questions and Answers (Complete Solutions)
15 views 0 purchase
Course
ITN 263
Institution
ITN 263
ITN 263 Midterm Exam | Questions and Answers (Complete Solutions) Who performs penetration testing? ethical hackers Which type of backup solution typically stores your data on another organization's hardware, making you dependent on their security, confidentiality assurance, and reliability? Clou...
Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability?
Cloud
An Access Control List (ACL) is an example of which of the following?
logical security
A security assessment may include which of the following steps?
perform a risk assessment
perform penetration testing
perform vulnerability scanning
Which of the following is a method of trapping hackers and detecting new attacks?
Honeypot
What is not an example of containment during incident response?
confirming a breach
Which of the following is an example of multi-factor authentication? Choose the best
answer.
a user accesses the server (login) with a username, password, and RSA token card
The best practice of 'use default deny over default permit' can be applied to which of the
following system? Choose the best answer.
Firewalls
What is the purpose of the post-mortem review after a security assessment?
learn from mistakes
What is another form of a honeypot?
padded cell
Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________.
separation of duties
,Window locks, door locks, and security cameras are examples of which of the
following?
physical security
One of the most effective preventative techniques in network security troubleshooting is
__________.
installing patches and updates
Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________.
principle of least privilege
Which of the following is an example of multi-factor authentication? choose the best
answer.
a bank ATM card and a pin number
Which of the following must an administrator organize to ensure follow-through of a new
security plan?
end-user training and awareness
Which of the following is not a network security management best practice?
implement single-factor authentication
Which of the following could compromise network security?
simplify by assigning maximum required permissions
Giving network users enough permissions to do their job is an example of , is an
example of __________.
least privilege
What is a potential disadvantage of online data backups?
dependency on provider's security
Which of the following helps avoid single points of failure by building in multiple
elements, pathways, or methods of accomplishing mission-critical tasks?
Redundancy
Using a fingerprint to unlock a workstation is an example of which of the following?
something you are
Which entity is responsible for global coordination of IP addressing?
Internet Assigned Numbers Authority (IANA)
What is accomplished with IP addressing?
Traffic management through routing
Traffic filtering
, Hardening is the process of reducing the _________ of a potential target by removing
unnecessary components and adding protections.
attack surface
Which of the following is the best reason you might switch from IPv4 to IPv6 as your
primary network protocol?
Security
Which IT domain marks the boundary where the private network meets the public
network?
LAN-to-WAN domain
Uninstalling all unnecessary applications and services on a user system is an example
of system hardening. In which IT domain is client system hardening typically applied?
Workstation Domain
Logging the time a user accessed a particular resource is an example of which of the
following?
Accounting
What employs routing protocols to exchange information about routes and connected
pathways? This information calculates the best path to guide a packet towards its
destination.
Router
The address range 192.168.0.0-192.168.255.255/16 is an example of which of the
following?
Class C
What is defined as any device on a network, even those without an IP address?
Node
Bus, tree, and mesh are types of __________.
network topologies
Why might you develop an acceptable use policy?
to establish network usage rules
When selecting networking equipment, which of the following is not a desirable feature
from a security perspective?
easy power switch
The principle of least privilege is often a good guideline as to appropriate ___________
settings.
authorization
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $20.49. You're not tied to anything after your purchase.