Examination
180 minutes
Instructions:
1. Read each question carefully.
2. Answer all questions.
3. Use the provided answer sheet to mark your responses.
4. Ensure all answers are final before submitting the exam.
5. Please answer each question below and click Submit when you
have completed the Exam.
6. This test has a time limit, The test will save and submit
automatically when the time expires
7. This is Exam which will assess your knowledge on the course
Learning Resources.
Good Luck!
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
Read All Instructions Carefully and Answer All the
Questions Correctly Good Luck: -
Directory Transversal - Answer>> Finding a directory
listing and gaining access to a parent or root file for
access to other files
Incremental Substitution - Answer>> Replacing numbers
in a url to access other files
Vulnerability Scanning - Answer>> The automated
process of proactively identifying vulnerabilities of
computing systems present in a network
Robert hopes to start a career in computer security. As
a new college-level student, he has just learned the
term ethical hacking, which is a key part of secure
information systems. Of the below options, choose
which will be key areas of expertise for Robert's future
career. Answer is complete. Select more than one
answer if applicable.
a. Robert needs to gain a large body of knowledge
about how computers function, with special regard to
networking and programming.
b. Operating systems are very important to Robert's
career. Because companies utilize varying operating
systems, including Windows (multiple versions), Mac
(multiple versions), UNIX, and Linux, he must develop
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
,an advanced understanding of each of the major
operating systems.
c. Robert should gain familiarity with computing and
hardware platforms, which are key to software
development.
d. Robert should be able to write reports related to his
field and have - Answer>> All of the above are correct
Which type of hacker uses their computer knowledge to
invade the privacy of others, thereby breaking security
laws and rendering the security of information systems
weak?
a. Security Providing Organization
b. Gray Hat
c. Black Hat
d. White Hat - Answer>> c. Black Hat
What is true about vulnerability in computer security?
a. This security weak spot is discovered and possibly
exploited in a Target of Evaluation and results from
failed analysis, design and implementation, or an
operation.
b. It is caused by the incompetence of humans, natural
disasters, or other indefensible situations.
c. This agent can take advantage of a weakness in an
information system or network.
d. It is the threat or potential threat of a security
violation and occurs only where there is a situation,
action, or event that has the potential to break through
security and damage a network or information system.
- Answer>> a. This security weak spot is discovered and
possibly exploited in a Target of Evaluation and results
from failed analysis, design and implementation, or an
operation.
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
, Which of the policies listed below is a valid set of rules
regarding connecting a system to an internal network
while physically in a different location?
a. Computer Security Policy
b. User Account Policy
c. Remote Access Policy
d. Network Security Policy - Answer>> c. Remote Access
Policy
How can you establish that policies, configurations and
procedural changes/updates are made in a controlled
and well-documented environment?
a. Vulnerability scanning
b. Compliance
c. Change management
d. Peer review - Answer>> c. Change management
Security, which is a measurement of how safe a system
or network is for individuals and organizations, is the
condition of well-being of information and
infrastructure. With a secure system, theft (particularly
undetected), tampering, and/or disruption (through
Denial of Service Attacks) of services and information
are limited to low or tolerable levels. Select the
elements of security from the list below.
a. Integrity
b. Availability
c. Non-Repudiation
d. Authenticity
e. Confidentiality - Answer>> All of the above.
Background: In her career as an Ethical Hacker, Diane
has been assigned to a new project. She must test the
security of a website. The only information that she is
provided about the network infrastructure is as follows:
Need Writing Help? We've Got You Covered! ✍️
100%
NO AI or Plagiarism Usage Guaranteed🎯
💬 Chat with us here: 📧 Hybridgrades101@gmail.com
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller YourAssignmentHandlers01. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.99. You're not tied to anything after your purchase.