100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITM 450 CH. 8-14|140 Review Check In Depth Questions And Answers Test $8.49   Add to cart

Exam (elaborations)

ITM 450 CH. 8-14|140 Review Check In Depth Questions And Answers Test

 6 views  0 purchase
  • Course
  • ITM 450
  • Institution
  • ITM 450

__________ is a layer 2 connection mechanism that uses packet-switching technology to establish virtual circuits between the communication endpoints. - ️️Frame relay __________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic. - ️️IPSec a _________...

[Show more]

Preview 2 out of 10  pages

  • September 12, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITM 450
  • ITM 450
avatar-seller
jackline98
__________ is a layer 2 connection mechanism that uses packet-switching technology to establish
virtual circuits between the communication endpoints. - ✔ ✔ Frame relay

__________ is a standards-based mechanism for providing encryption for point-to-point TCP/IP traffic. -
✔ ✔ IPSec

a ______________ is an intelligent hub because it knows the addresses of the systems connected on
each outbound port. Instead of repeating traffic on every outbound port, it repeats traffic only out of
the port on which the destination is known to exist. - ✔ ✔ Switch

a central authority determines which files a user can access based on the organization's hierarchy.
Which of the following best describes this? - ✔ ✔ RBAC model

a central authority determines which files a user can access. Which of the following best describes this? -
✔ ✔ Nondiscretionary access control model

a significant benefit of a security control is when it goes unnoticed by users. What is this called? - ✔ ✔
Transparency

a table includes multiple objects and subjects and it identifies the specific access each subject has to
different objects. What is this table? - ✔ ✔ Access control matrix



which of the following basic principles was violated during the administrator's employment? - ✔ ✔
Least privilege

an organization has recently suffered a series of security breaches that have damaged its reputation.
Several successful attacks have resulted in compromised customer database files accessible via one of
the company's web servers. Additionally, an employee had access to secret data from previous job
assignments. This employee made copies of the data and sold it to competitors. The organization has
hired a security consultant to help them reduce their risk from future attacks.



management wants to ensure that the consultant has the correct priorities while doing her research. Of
the following, what should be provided to the consultant to meet this need? - ✔ ✔ Asset valuation

an organization has recently suffered a series of security breaches that have damaged its reputation.
Several successful attacks have resulted in compromised customer database files accessible via one of

, a Type B fire extinguisher may use all except which of the following suppression mediums? - ✔ ✔
Water

a user logs in with a login ID and a password. What is the purpose of the login ID? - ✔ ✔
Identification

accountability requires all of the following items except one. Which item is not required for
accountability? - ✔ ✔ Authorization

an administrator has been working within an organization for over 10 years. He has moved between
different IT divisions within the company and has retained privileges from each of the jobs that he's had
during his tenure. Recently, supervisors admonished him for making unauthorized changes to systems.
He once again made an unauthorized change that resulted in an unexpected outage and management
decided to terminate his employment at the company. He came back to work the following day to clean
out his desk and belongings, and during this time he installed a malicious script that was scheduled to
run as a logic bomb on the first day of the following month. The script will change administrator
passwords, delete files, and shut down over 100 servers in the datacenter.



what could have discovered problems with this user's account while he was employed? - ✔ ✔
Account review

an administrator has been working within an organization for over 10 years. He has moved between
different IT divisions within the company and has retained privileges from each of the jobs that he's had
during his tenure. Recently, supervisors admonished him for making unauthorized changes to systems.
He once again made an unauthorized change that resulted in an unexpected outage and management
decided to terminate his employment at the company. He came back to work the following day to clean
out his desk and belongings, and during this time he installed a malicious script that was scheduled to
run as a logic bomb on the first day of the following month. The script will change administrator
passwords, delete files, and shut down over 100 servers in the datacenter.

the company's web servers. Additionally, an employee had access to secret data from previous job
assignments. This employee made copies of the data and sold it to competitors. The organization has
hired a security consultant to help them reduce their risk from future attacks.



what would the consultant use to identify potential attackers? - ✔ ✔ Threat modeling

at which OSI model layer does the IPsec protocol function? - ✔ ✔ Network

by examining the source and destination addresses, the application usage, the source of origin, and the
relationship between current packets with the previous packets of the same session, ______________

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller jackline98. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78600 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.49
  • (0)
  Add to cart