ITN 263 Midterm Pt 1 | Questions with Verified Answers
14 views 0 purchase
Course
ITN 263
Institution
ITN 263
ITN 263 Midterm Pt 1 | Questions with Verified Answers Which of the following is described as "confidence in your expectation that others will act in your best interest"? Trust Estefan is a network professional for an e-commerce company. The chief information officer (CIO) wants the customer web ...
Which of the following is described as "confidence in your expectation that others will
act in your best interest"?
Trust
Estefan is a network professional for an e-commerce company. The chief information
officer (CIO) wants the customer web portal downtime to be reduced from 5 minutes per
year to 30 seconds per year. The change should occur over the next 6 months. Which
security objective must Estefan employ to accomplish this goal?
Availability
Kristin's position in IT focuses on using antivirus, anti-spyware, and vulnerability
software patch management to maintain security and integrity. Which IT infrastructure
domain is she protecting?
Workstation Domain
To secure the System/Application Domain of an IT infrastructure, what is the primary
focus?
In a collection of servers and virtualized systems, defending both data and server
computing power
Which of the following must be done first to accomplish an organization's security
goals?
Write down security goals.
Temika is the IT security officer for her company. The CIO has told her that network
security success is not about preventing all possible attacks or compromises. Of the
following, what goal or accomplishment should she work toward?
Continually improving the state of security so that, as time passes, the network is better
protected than it was in the past
Which of the following roles is most commonly responsible for observing system and
user activity, looking for violations, trends towards bottlenecks, and attempts to perform
violations?
Auditor
A company has discovered that confidential business information has been repeatedly
acquired by a competitor over the past six months. The IT security team has been
unable to find the leaks. The team suspects a form of side-channel eavesdropping may
be involved. What is the suspected hacking method?
The competitor is using a phreaking attack
, As part of the bring your own device (BYOD) program, the company CIO is encouraging
employees to use their personal devices for business purposes. However, an attacker
with the right kind of antenna can access the wireless network from a great distance,
putting internal assets at risk. Of the following, what is the best solution?
Physically isolate wireless access from the wired network.
A combination of intrusion detection and prevention, as well as logging and monitoring,
provides the best defense against what kind of attack?
Zero-day exploit
Which of the following is considered a node?
Networked printer
You are setting up a small home network. You want all devices to communicate with
each other. You assign IPv4 addresses between 192.168.0.1 and 192.168.0.6 to the
devices. What processes must still be configured so that these nodes can communicate
with the Internet?
Both network address translation (NAT) and port address translation (PAT) must be
enabled to allow private network addresses to be translated to a random external port
and public IP address.
Many company employees work from home on a full-time basis. What technology do
they commonly use to communicate securely with the organization's network?
Virtual private network (VPN)
A major U.S. online retailer has discovered that thousands of purchases have been paid
for by stolen credit card numbers. An initial analysis of the location of the buyers reveals
IP addresses from within the United States. Upon further investigation, it is found that
the actual origin point of the fraudulent buyer is a series of IP addresses located in Asia.
What technology is the fraudster using?
Proxy server
You are a network professional. You want to overcome the security shortcomings of the
Domain Name System (DNS). Of the following, what is one of those shortcomings?
Use of a plaintext communication
Mel is working from home and speaking with her department manager on a Voice over
IP (VoIP) phone connection. This technology allows telephone conversations to be
routed over the Internet. During a VoIP conversation, Mei loses a few moments of what
the manager has said to her. What is the problem?
The OSI model Transport Layer was unable to guarantee reliable packet delivery.
Which OSI model layer deals with frames?
Data Link Layer
Which form of firewall filtering is NOT as clear or distinct as other types?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $17.99. You're not tied to anything after your purchase.