ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+
Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to Moa's inbox on Tuesday.
How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad Trojan is circulating and that he s...
ITN 260 EXAM QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) GRADED A+
Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to
Moa's inbox on Tuesday.
How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad
Trojan is circulating and that he should change his security settings.
Which of these items retrieved through dumpster diving would NOT provide useful
information? - Answer- books
Hedda pretends to be the help desk manager and calls Steve to trick him into giving her
his password. What social engineering attack has Hedda performed? - Answer-
impersonation
Linnea's father called her to say that a message suddenly appeared on his screen that
says his software license has expired and he must immediately pay $500 to have it
renewed before control of the computer will be returned to him. What type of malware is
this? - Answer- blocking ransomware
Which of the following is defined as following an authorized person through a secure
door? - Answer- tailgating
Which variation of a phishing attack sends phishing messages only to wealthy
individuals? - Answer- Whaling
Which type of mutation completely changes a virus from its original form by rewriting its
own code whenever it is executed? - Answer- metamorphic
A watering hole attack is directed against which of the following? - Answer- a smaller
group of specific users
What is a characteristic of the Trusted Platform Module (TPM)? - Answer- It provides
cryptographic services in hardware instead of software
Which of these has an onboard key generator and key storage facility, as well as
accelerated symmetric and asymmetric encryption, and can back up sensitive material
in encrypted form? - Answer- Hardware Security Module (HSM)
, Illya was asked to recommend the most secure asymmetric cryptographic algorithm to
his supervisor. Which of the following did he choose? - Answer- SHA-2
Which of the following key exchanges uses the same keys each time? - Answer- Diffie-
Hellman (DH)
A(n) _____ is not decrypted but is only used for comparison purposes. - Answer- digest
Alyosha was explaining to a friend the importance of protecting a cryptographic key
from cryptoanalysis. He said that the key should not relate in a simple way to the cipher
text. Which protection is Alyosha describing? - Answer- confusion
What is the latest version of the Secure Hash Algorithm? - Answer- SHA-3
Egor wanted to use a digital signature. Which of the following benefits will the digital
signature not provide? - Answer- verify the receiver
The Hashed Message Authentication Code (HMAC) _____. - Answer- hashes the key
and the message
Proving that a user sent an email message is known as _____. - Answer- non-
repudiation
Alexei was given a key to a substitution cipher. The key showed that the entire alphabet
was rotated 13 steps. What type of cipher is this? - Answer- ROT13
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
- Answer- plaintext
At a staff meeting one of the technicians suggested that the enterprise protect its new
web server by hiding it and not telling anyone where it is located. Iosif raised his hand
and said that security through obscurity was a poor idea. Why did he say that? -
Answer- It would be essentially impossible to keep its location a secret from everyone.
Which of these is NOT a basic security protection for information that cryptography can
provide? - Answer- risk loss
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his
coworker an example of adding two bits, 1 and 1. What is the result of this sum? -
Answer- 0
Which of these is the strongest symmetric cryptographic algorithm? - Answer-
Advanced Encryption Standard
If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message? - Answer- Alice's public key
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.