ITN 260 EXAM QUESTIONS WITH ALL CORRECT ANSWERS
Which of the following is malicious computer code that reproduces itself on the same computer? - Answer- virus
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically ...
Which of the following is malicious computer code that reproduces itself on the same
computer? - Answer- virus
What kind of software program delivers advertising content in a manner that is
unexpected and unwanted by the user, and is typically included in malware? - Answer-
Adware
Which of the following is not one of the four methods for classifying the various types of
malware - Answer- Source
A virus that infects an executable program file is known as? - Answer- program virus
What type of malware consists of a set of software tools used by an attacker to hide the
actions or presence of other types of malicious software, such as Trojans, viruses, or
worms? - Answer- rootkit
A series of instructions that can be grouped together as a single command and are
often used to automate a complex set of tasks or a repeated series of tasks are known
as: - Answer- A macro
Malware that locks or prevents a device from functioning properly until a fee has been
paid is known as: - Answer- Ransomware
What is the maximum effective range of a typical passive RFID tag? - Answer- 19
An attack in which the attacker attempts to impersonate the user by using his or her
session token is known as: - Answer- Session hijacking
HTML uses which option below within embedded brackets (< >) causing a web browser
to display text in a specific format? - Answer- tags
Which SQL injection statement example below could be used to discover the name of
the table? - Answer- whatever' AND 1=(SELECT COUNT(*) FROM tabname); --
When TCP/IP was developed, the host table concept was expanded into a hierarchical
name system for matching computer names and numbers using this service: - Answer-
DNS
, Which SQL injection statement can be used to erase an entire database table? -
Answer- whatever'; DROP TABLE members
Cipher locks are sometimes combined with what type of sensor, which uses infrared
beams that are aimed across a doorway? - Answer- Tailgate sensors
Instead of trying to make a match, modern AV techniques are beginning to use a type of
detection that attempts to identify the characteristics of a virus. What is the name for this
technique? - Answer- heuristic detection
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of
what kind of technology? - Answer- Anti-climb
Which of the following is not one of the types of settings that would be included in a
Microsoft Windows security template? - Answer- Resolution settings
On a compromised computer, you have found that a user without administrative
privileges was able to perform a task limited to only administrative accounts. What type
of exploit has occurred? - Answer- Privilege escalation
Select the tool below that consists of a system of security tools that is used to recognize
and identify data that is critical to an organization and ensure that it is protected: -
Answer- Data Loss Prevention
The exchange of information among DNS servers regarding configured zones is known
as: - Answer- zone transfer
What language below is for the transport and storage of data, with the focus on what the
data is? - Answer- XML
How can an attacker substitute a DNS address so that a computer is automatically
redirected to another device? - Answer- DNS poisoning
What type of video surveillance is typically used by banks, casinos, airports, and military
installations, and commonly employs guards who actively monitor the surveillance? -
Answer- CCTV
Attacks that take place against web based services are considered to be what type of
attack? - Answer- Server Side
How can an area be made secure from a non-secured area via two interlocking doors to
a small room? - Answer- Using a mantrap
The default root directory of the Microsoft Internet Information Services (IIS) Web server
is located at which directory below? - Answer- C:\Inetpub\ wwwroot
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.59. You're not tied to anything after your purchase.