Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN-263 MIDTERM REVIEW QUESTIONS AND ANSWERS 100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
13-03-2026
Geschreven in
2025/2026

ITN-263 MIDTERM REVIEW QUESTIONS AND ANSWERS 100% CORRECT ITN-263 MIDTERM REVIEW QUESTIONS AND ANSWERS 100% CORRECT ITN-263 MIDTERM REVIEW QUESTIONS AND ANSWERS 100% CORRECT ITN-263 MIDTERM REVIEW QUESTIONS AND ANSWERS 100% CORRECTStatic Addresses - ANSWER-Some private network nodes may be assigned a static Public IP address that is routable and not affected by your NAT translation scheme Authorization - ANSWER-Normally use Microsoft Active Directory Services for privilege access control. Defines what individual users may or may not do. Session Hijacking - ANSWER-When a hacker takes over a connection after a client has authenticated with a server. A hacker must eavesdrop to learn details, such as the addresses of the session endpoints and the sequencing numbers. The hacker will desynchronize the client, take on the clients address, and inject packets into the data stream. If the server accepts them, the session has been taken over. The Hunt tool may be used for this purpose. Man-in-the-middle (MinM) attack - ANSWER-A hacker is positioned between a client and a server. The client is fooled into connecting with the hacker's computer instead of the real server. The hacker performs a spoofing attack to trick the client. The connection between client and server is then proxied by the hacker who can eavesdrop and manipulate the communication.

Meer zien Lees minder
Instelling
ITN-263
Vak
ITN-263

Voorbeeld van de inhoud

ITN-263 MIDTERM REVIEW
QUESTIONS AND ANSWERS 100%
CORRECT
Static Addresses - ANSWER-Some private network nodes may be assigned a static
Public IP address that is routable and not affected by your NAT translation scheme

Authorization - ANSWER-Normally use Microsoft Active Directory Services for
privilege access control. Defines what individual users may or may not do.

Session Hijacking - ANSWER-When a hacker takes over a connection after a client
has authenticated with a server. A hacker must eavesdrop to learn details, such as
the addresses of the session endpoints and the sequencing numbers. The hacker
will desynchronize the client, take on the clients address, and inject packets into the
data stream. If the server accepts them, the session has been taken over. The Hunt
tool may be used for this purpose.

Man-in-the-middle (MinM) attack - ANSWER-A hacker is positioned between a client
and a server. The client is fooled into connecting with the hacker's computer instead
of the real server. The hacker performs a spoofing attack to trick the client. The
connection between client and server is then proxied by the hacker who can
eavesdrop and manipulate the communication.

Reconnaissance (Footprinting) Phase - ANSWER-Learning as much as possible
about the target before an attack. collecting data about the target from multiple
sources online and offline. Effective Recon is done covertly without tipping off the
target. Also called footprinting, discovery, research, and info gathering.

What items should be covered in a company security policy - ANSWER-How to treat
company data, requires the deployment of a firewall, confidentiality policies, etc.
Should be clearly written with solid and well-defined goals. Senior Management has
the ultimate responsibility for security. a written policy ensures the success of your
company's security infrastructure.

Acceptable User Policy (AUP) - ANSWER-It is a document that new users must
review and sign before they are allowed access to the company network resources
and infrastructure. Details what the user is and is not allowed to do on the company
network.

Advanced Persistent Threat (APT) - ANSWER-A network attack in which an intruder
gains access to a network and stays there undetected with the intention of stealing
data over a long period of time. Sectors with high value information such as defense,
manufacturing, and financial are common targets.

What protocols do VPNS use for encrypting data? - ANSWER-Normally IPSec or
TLS (SSH sunsetting next month)

, Wired Networks vs. Wireless Networks - ANSWER-Biggest difference is the
mechanism and proximity of the attack. Wired networks the hacker must gain
physical proximity and make direct contact with a network device. With wireless, the
hacker doesn't have to be physically close (<1000' up to a mile with a directional
antenna). In wireless networks, the hacker could use a rogue AP.

Replay Attack - ANSWER-A hacker uses a network sniffer and then retransmits that
traffic back on the network at a later time. These attacks often focus on
authentication traffic hoping that retransmitting the same packets will allow the
hacker to logon

Strong Encryption - ANSWER-Encryption that is difficult to decrypt or "break" without
the encryption key. Has a good algorithm, a long keyspace (normally 128 bits.), and
good key management. encryption fails If either endpoint is compromised or if
intermediate network nodes that decrypt & encrypt fail.

Avalanche effect - ANSWER-Algorithm design requirement so that slight changes to
the input result in drastic changes to the output. Common feature of hash values.

digital certificate - ANSWER-an electronic proof of identity issued by a CA. It is an
entity's public key encoded by the CA's private key

Digital Signature - ANSWER-a public-key cryptography based mechanism for
proving the source (and possibly integrity) of a signed dataset or message. Uses the
private key of the sender.

Hashes - ANSWER-A unique digest produced by an algorithm when applied to a
data set. It verifies the integrity of the data.

VPNs (Virtual Private Networks) - ANSWER-These are created and managed by
using protocols such as Point-to-Point Tunneling Protocol and Layer 2 Tunneling
Protocol which build on the functionality of PPP. This makes it possible to create
dedicated point-to-point tunnels through a public network such as the Internet.

VPN-Cons - ANSWER-difficult to set up, latency, MTU, throughput limited.

VPN-Pros - ANSWER-Allow secure remote access to internal, private networks.
Less expensive than leased lines. Prevents eavesdropping.

Bastion Host - ANSWER-a hardened server normally in the DMZ that has all
unnecessary applications and protocols removed from it.

What systems are normally hardened? - ANSWER-servers and client workstations
are hardened by removing unnecessary software, installing updates, and imposing
secure configuration settings.

Insertion attack - ANSWER-an exploit based on the introduction of unauthorized
content or devices to an otherwise secured infrastructure. Three common attacks
include SQL, IDS, and rogue devices.

Geschreven voor

Instelling
ITN-263
Vak
ITN-263

Documentinformatie

Geüpload op
13 maart 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursingTutor1 West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1683
Lid sinds
3 jaar
Aantal volgers
1074
Documenten
18398
Laatst verkocht
3 dagen geleden
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

458 beoordelingen

5
216
4
79
3
92
2
21
1
50

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen