100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Final ITN 260 Exam Practice Questions and Answers – Updated 2024 $12.49   Add to cart

Exam (elaborations)

Final ITN 260 Exam Practice Questions and Answers – Updated 2024

 1 view  0 purchase
  • Course
  • 2024/2025
  • Institution
  • 2024/2025

Final ITN 260 Exam Practice Questions and Answers – Updated 2024 Which of the following is not used to describe those who attack computer systems? - Answer-Malicious agent Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered ...

[Show more]

Preview 4 out of 47  pages

  • October 16, 2024
  • 47
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • 2024/2025
  • 2024/2025
avatar-seller
Emillect
EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024




Final ITN 260 Exam Practice Questions
and Answers – Updated 2024

Which of the following is not used to describe those who attack computer systems? -

Answer✔✔-Malicious agent


Which of the following of the CIA Triad ensures that the information is correct, and no

unauthorized person has altered it? - Answer✔✔-Integrity


Which of the following ensures that only authorized parties can view protected information? -

Answer✔✔-Confidentiality


What is the category of threat actors that sell their knowledge of vulnerabilities to other

attackers or governments? - Answer✔✔-Brokers


Which type of hacker will probe a system for weaknesses and then privately provide that

information back to the organization? - Answer✔✔-White hat hackers


Which of the following is not a reason why a legacy platform has not been updated? -

Answer✔✔-No compelling reason for any updates


After Bella earned her security certification, she was offered a promotion. As she reviewed the

job responsibilities, she saw that in this position she will report to the CISO and will be a




Page 1/47

,EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024


supervisor over a group of security technicians. Which of these generally recognized security

positions has she been offered? - Answer✔✔-Security manager


Complete this definition of information security: That which protects the integrity,

confidentiality, and availability of information _____. - Answer✔✔-through products, people,

and procedures on the devices that store, manipulate, and transmit the information


Which tool is most commonly associated with state actors? - Answer✔✔-Advanced Persistent

Threat (APT)


How do vendors decide which should be the default settings on a system? - Answer✔✔-Those

settings that provide the means by which the user can immediately begin to use the product.


Which of the following groups use Advanced Persistent Threats? - Answer✔✔-State actors


What is the term used to describe the connectivity between an organization and a third party? -

Answer✔✔-System integration


Which of the following is not a recognized attack vector? - Answer✔✔-On-prem


Which of the following is not an issue with patching? - Answer✔✔-Patches address zero-day

vulnerabilities


Which of the following is not true regarding security? - Answer✔✔-Security is a war that must

be won at all costs


Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks

that occured were mainly for what purpose? - Answer✔✔-Fame

Page 2/47

,EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024


Which of the following is false about the CompTIA Security+ certification? - Answer✔✔-

Professionals who hold the Security+ certification earn about the same or slightly less than

security professionals who have not achieved this certification.


Which of the following groups have the lowest level of technical knowledge? - Answer✔✔-

Script kiddies


Which of the following is true regarding the relationship between security and convenience? -

Answer✔✔-Security and convenience are inversely proportional


What is an objective of state-sponsored attackers? - Answer✔✔-To spy on citizens


Which of the following is NOT a characteristic of a penetration test? - Answer✔✔-Automated


Which premise is the foundation of threat hunting? - Answer✔✔-Threat actors have already

infiltrated our network


What penetration testing level name is given to testers who have no knowledge of the network

and no special privileges? - Answer✔✔-Black box


Ebba has received a new initiative for her security team to perform an in-house penetration

test. What is the first step that Ebba should undertake? - Answer✔✔-Planning


Which is the final rule of engagement that would be conducted in a pen test? - Answer✔✔-

Reporting




Page 3/47

, EMILLECT 2024/2025 ACADEMIC YEAR ©2024 EMILLECT. ALL RIGHTS RESERVED FIRST PUBLISH OCTOBER, 2024


When researching how an attack recently took place, Nova discovered that the threat actor,

after penetrating the system, started looking to move through the network with their elevated

position. What is the name of this technique? - Answer✔✔-Lateral movement


Lykke's supervisor is evaluating whether to use internal security employees to conduct a

penetration test. Lykke does not consider this a good idea and has created a memo with several

reasons they should not be used. Which of the following would NOT be part of that memo? -

Answer✔✔-They would have to stay overnight to perform the test.


Which of the following is NOT an advantage of crowdsourced penetration testing? - Answer✔✔-

Less expensive


Which of the following is NOT a general information source that can provide valuable in-depth

information on cybersecurity? - Answer✔✔-Twitter


Which group is responsible for the Cloud Controls Matrix? - Answer✔✔-CSA


Which ISO contains controls for managing and controlling risk? - Answer✔✔-ISO 31000


Which of the following is not something that a SIEM can perform? - Answer✔✔-Incident

response


What are documents that are authored by technology bodies employing specialists, engineers,

and scientists who are experts in those areas? - Answer✔✔-Requests for comments (RFCs)




Page 4/47

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Emillect. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79223 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart