Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 263 MIDTERM PT 2. (CH. 4-6) COMPLETE QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
13-03-2026
Geschreven in
2025/2026

ITN 263 MIDTERM PT 2. (CH. 4-6) COMPLETE QUESTIONS AND ANSWERSITN 263 MIDTERM PT 2. (CH. 4-6) COMPLETE QUESTIONS AND ANSWERSITN 263 MIDTERM PT 2. (CH. 4-6) COMPLETE QUESTIONS AND ANSWERSITN 263 MIDTERM PT 2. (CH. 4-6) COMPLETE QUESTIONS AND ANSWERSSlack space refers to the unused portion of the last cluster allocated to a stored file. It may contain remnants of prior files stored in that location. True or False? - ANSWER-True Which name is given to a rogue program that automatically dials a modem to a pre-defined number to auto-download additional malware to the victim or to upload stolen data from the victim? Spyware Dialer Sector Adware - ANSWER-Dialer Redundant array of independent disks (RAID) is a disk set management technology that gains speed and fault tolerance.

Meer zien Lees minder
Instelling
ITN 263
Vak
ITN 263

Voorbeeld van de inhoud

ITN 263 MIDTERM PT 2. (CH. 4-6)
COMPLETE QUESTIONS AND
ANSWERS
Slack space refers to the unused portion of the last cluster allocated to a stored file.
It may contain remnants of prior files stored in that location.

True or False? - ANSWER-True

Which name is given to a rogue program that automatically dials a modem to a pre-
defined number to auto-download additional malware to the victim or to upload
stolen data from the victim?

Spyware
Dialer
Sector
Adware - ANSWER-Dialer

Redundant array of independent disks (RAID) is a disk set management technology
that gains speed and fault tolerance.

True or False? - ANSWER-True

Which of the following describes a banner?

A variant of the UNIX operating system that is supported by Windows NT 4.0, but not
subsequent version of Windows.

Persistent public messaging forums accessed over the Network News Transfer
Protocol (NNTP).

A message sent by a service in response to a valid or invalid query. Its function is to
confirm communication is functioning properly or to announce an error.

A form of unauthorized access to a system. - ANSWER-A message sent by a service
in response to a valid or invalid query. Its function is to confirm communication is
functioning properly or to announce an error.

A metacharacter is a character that has a special meaning assigned to it and is
recognized as part of a scripting or programming language. Escaping
metacharacters is a programmatic tactic to treat all characters as basic ASCII rather
than as something with special meaning or purpose.

True or False? - ANSWER-True

,Which of the following refers to the malicious insertion of scripting code onto a
vulnerable Web site?

Cross-site scripting (XSS)
Keystroke logger
Insertion attack
Upstream filtering - ANSWER-Cross-site scripting (XSS)

NTFS is a storage device file system developed by Apple Inc. for use on Macintosh
computers; it supports multiple resource forks for file objects.

True or False? - ANSWER-False

When a communication exchange that does not verify the identity of the endpoints of
a communication and accepts any properly formed response as valid, a non-
authenticating query service is in use.

True or False? - ANSWER-True

Reconnaissance is the act of learning as much as possible about a target before
attempting attacks.

True or False? - ANSWER-True

Which name is given to an exploit that allows a hacker to run any command-line
function on a compromised system?

Arbitrary code execution
ARP spoofing
Whois
Command shell - ANSWER-Arbitrary code execution

A script kiddie is an experienced hacker who uses his or her own tools or scripts.

True or False? - ANSWER-False

Which of the following us an intentional discharge made to damage or destroy
electronic equipment ranging from cell phones to computers and servers?

Chip creep
Virus
Session hijacking
Intentional electromagnetic interference (IEMI) - ANSWER-Intentional
electromagnetic interference (IEMI)

Which of the following is given to a software interface with a system that allows code
execution?

Command shell

, Proxy

National Institute of Standards and Technology (NIST)

Intentional Electromagnetic Interference (IEMI) - ANSWER-Command shell

Leetspeak is a secret form of communication or language hackers use based on
replacing letters with numbers, symbols, or other letters that resemble the original
characters.

True or False? - ANSWER-True

A worm is used to create Trojan horses by embedding malware inside of a host file
or program.

True or False? - ANSWER-False

Which term is used to describe a feature added to the NTFS file system to support
files from POSIX, OS/2, and Macintosh?

Deterrent
Hierarchical file system (HFS)
Adware
Alternate data stream (ADS) - ANSWER-Alternate data stream (ADS)

Which term describes a form of security defense that focuses on discouraging a
perpetrator with physical harm, social disgrace, and legal consequences?

Firewall
Dumpster diving
Buffer overflow
Deterrent - ANSWER-Deterrent

Social engineering is the craft of manipulating people into performing tasks or
releasing information that violates security.

True or False? - ANSWER-True

Which of the following is a form of exploitation in which the data on a DNS server is
falsified so that subsequent responses to DNS resolution queries are incorrect?

Banner grabbing
DNS poisoning
Dialer
Dumpster diving - ANSWER-DNS poisoning

Hackers can be deterred by defense methods that detect and evade. All of the
following are defense methods, except which one?

Botnet army

Geschreven voor

Instelling
ITN 263
Vak
ITN 263

Documentinformatie

Geüpload op
13 maart 2026
Aantal pagina's
19
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$19.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursingTutor1 West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1681
Lid sinds
3 jaar
Aantal volgers
1074
Documenten
18395
Laatst verkocht
1 week geleden
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

457 beoordelingen

5
216
4
79
3
91
2
21
1
50

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen