100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IS 305 Midterm Exam | Complete Solutions (Verified) $18.49   Add to cart

Exam (elaborations)

IS 305 Midterm Exam | Complete Solutions (Verified)

 12 views  0 purchase
  • Course
  • IS 305
  • Institution
  • IS 305

IS 305 Midterm Exam | Complete Solutions (Verified) The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understand. True The type of hacking that involves breaking into telephone systems is called sneaking. False The technique for br...

[Show more]

Preview 3 out of 17  pages

  • August 29, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • IS 305
  • IS 305
avatar-seller
Bri254
IS 305 Midterm Exam


The Domain Name Service is what translates human-readable domain names into IP
addresses that computers and routers understand.
True

The type of hacking that involves breaking into telephone systems is called sneaking.
False

The technique for breaching a system's security by exploiting human nature rather than
technology is war-driving.
False

Malware is a generic term for software that has a malicious purpose.
True

Software that lays dormant until some specific condition is met is a Trojan horse.
False

Someone who breaks into a system legally to assess security deficiencies is a sneaker.
True

Auditing is the process to determine if a user's credentials are authorized to access a
network resource.
False

Confidentiality, integrity, and availability are three pillars of the CIA triangle.
True

The Health Insurance Portability and Accountability Act of 1996 requires government
agencies to identify sensitive systems, conduct computer security training, and develop
computer security plans.
False

The SANS Institute website is a vast repository of security-related documentation.
True

In which type of hacking does the user block access from legitimate users without
actually accessing the attacked system?
Denial of Service

Your company is instituting a new security awareness program. You are responsible for
educating end users on a variety of threats, including social engineering. Which of the
following best defines social engineering?

,Using people skills to obtain proprietary information

Which type of hacking occurs when the attacker monitors an authenticated session
between the client and the server and takes over that session?
Session hijacking

Someone who finds a flaw in a system and reports that flaw to the vendor of the system
is a __________.
White hat hacker

Someone who gains access to a system and causes harm is a __________?
Black hat hacker

A black hat hacker is also called a ___________
Cracker

Someone who calls himself a hacker but lacks the expertise is a ________.
Script kiddy

Someone who legally breaks into a system to assess security deficiencies is a
________.
Penetration tester

A(n) ______ is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems.
Firewall

A(n) hides the internal network's IP address and presents a single IP address to the
outside world.
Proxy server

Which one of these is NOT one the three pillars of security in the CIA triangle?
Authentication

Which of these is the process to determine if the credentials given by a user or another
system are authorized to access the network resource in question?
Authentication

Which of these is a repository of security-related documentation and also sponsors a
number of security research projects?
SANS Institute

Which of these was the first computer incident-response team?
Computer Emergency Response Team

Which of these is a repository for detailed information on virus outbreaks?

, F-Secure

The notation used to perform variable-length subnet masking for IP addresses is CIDR.
True

The name you type into a browser's address bar, such as www.microsoft.com, is known
as the IP locator.
False

The IP command-line command to determine your computer's IP address, subnet mask,
and default gateway is ping.
False

The IP command-line command to determine the number of hops it takes to get from
your computer to its destination is ping.
False

No protocols operate at the physical layer of the OSI model.
True

The session layer of the OSI model provides the mechanism to manage the dialogue
between end-user application processes.
True

The TCP protocol works at the network layer of the OSI model.
False

MAC addresses are unique addresses for each NIC.
True

The first four bytes of the MAC address identify the vendor.
False

A host is a machine with data on it, to which you can connect.
True

Unshielded twisted-pair cable capable with a specification of 100 MHz/100 Mbps is also
called Category ________.
5

Which device can connect many computers and sends packets out every port?
Hub

Which device is used to boost a signal?
Repeater

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Bri254. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49
  • (0)
  Add to cart