Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
13-03-2026
Written in
2025/2026

ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+) Which of the following is not a primary objective of information security? - ANSWER-Privacy A security assessment may include which of the following steps? - ANSWER-All of the above Security ________ are goals an organization strives to achieve through its security efforts. - ANSWER-Objectives Assigning users, including administrators, only the necessary privileges, access, and permissions to accomplish their assigned work is an example of __________. - ANSWER-the principle of least privilege

Show more Read less
Institution
ITN 263
Course
ITN 263

Content preview

ITN 263 FINAL EXAM|| 246
QUESTIONS AND ANSWERS
(GRADED A+)
Which of the following is not a primary objective of information security? - ANSWER-
Privacy

A security assessment may include which of the following steps? - ANSWER-All of
the above

Security ________ are goals an organization strives to achieve through its security
efforts. - ANSWER-Objectives

Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________. -
ANSWER-the principle of least privilege

Which of the following is not a distinguishing characteristic of a WAN compared to a
LAN? - ANSWER-Has a limited geographic area

Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________. - ANSWER-separation of duties

From the perspective of computers and networks, _________ is confidence that
other users will act in accordance with your organizations - ANSWER-Trust

One of the most effective preventative techniques in network security
troubleshooting is __________. - ANSWER-installing patches and updates

Which of the following has the ultimate and final responsibility for network security in
an organization? - ANSWER-Senior management

What is a potential disadvantage of online data backups? - ANSWER-Dependency
on provider's security

What does a client/server environment have that a peer-to-peer networking
environment typically does not? - ANSWER-Server

What is another form of a honeypot? - ANSWER-Padded cell

What is not an example of containment during incident response? - ANSWER-
Confirming a breach

Which of the following do you not get with network address translation (NAT)? -
ANSWER-A static public IP address for each internal client

,Which of the following enables you to check a client computer for compliance with
security policies and either grant or deny its access to the internal network? -
ANSWER-Network access control

What is the purpose of the post-mortem review after a security assessment? -
ANSWER-Learn from mistakes.

Which IT domain includes demilitarized zones (DMZs) and intrusion detection
systems (IDS)? - ANSWER-LAN-to-WAN Domain

Which of the following could compromise network security? - ANSWER-Simplify by
assigning maximum required permissions

Which IT domain in a typical IT infrastructure typically includes routers, circuits,
switches, firewalls, and equivalent gear at remote locations? - ANSWER-WAN
Domain

Which of the following is not a network security management best practice? -
ANSWER-Implement single-factor authentication

The lack of ____________ is both a strength and weakness of workgroups. -
ANSWER-Central authority

Which of the following is not true of compliance auditing? - ANSWER-A regular
compliance audit can be used in place of an organization's security policy.

You are filtering MAC addresses on a switch by blocking only specific IP addresses.
What do you use to perform this type of filtering? - ANSWER-Black list

Which of the following must an administrator organize to ensure follow-through of a
new security plan? - ANSWER-End-user training and awareness

You can filter which type of traffic on a typical firewall? - ANSWER-Both ingress and
egress

Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability? - ANSWER-Cloud

Who performs penetration testing? - ANSWER-Ethical hackers

Which private address range is 172.16.0.0-172.31.255.255 /12? - ANSWER-Class B

A _________ is a boundary network that hosts resource servers for the public
Internet. - ANSWER-DMZ

Window locks, door locks, and security cameras are examples of which of the
following? - ANSWER-Physical security

, A ___________ is either a hardware device or a software product you deploy to
enforce the access control policy on network communications. - ANSWER-Firewall

An IDS or IPS that uses a database of signatures or patterns of known malicious
activities to detect threats is called _______________ detection. - ANSWER--
knowledge-based

_______ resolves FQDNs into the associated IP address. [hint 3 letters abbreviation]
- ANSWER-DNS

Deciding which firewall rules to define is subject to an organization's
_____________. - ANSWER-- security policy

_______________ is the process of securing or locking down a host against threats
and attacks. - ANSWER-Hardening

In which situation is a change control system most effective? - ANSWER--
Troubleshooting

_____ ________ __________are new and previously unknown attacks for which no
current specific defenses exist. [hint 3 words] - ANSWER-Zero day exploits

Regarding firewall rules, what is another name for default deny? - ANSWER-- Deny
all

______ __________ ____________ allows an attacker to eavesdrop on electronic
devices from a distance. The technique is to perfect or simple to perform, but has
been demonstrated on LCD and CRT monitors as well as keyboard cables. With
minor shielding, you can eliminate most of the risk from such an attack. - ANSWER-
Van Eck phreaking

What is an access control list (ACL)? - ANSWER-- A firewall rule or filter

Which layer of the OSI reference model handles logical addressing (IP addresses)
and routing traffic? - ANSWER-Network

What is an important thing to do regarding firewall logs? - ANSWER-- Review the log
files frequently.

Which of the following a problem for static filtering? - ANSWER-Large, unordered
rule sets

What is one of the most problematic issues with an intrusion detection system (IDS)?
- ANSWER-- False negatives

What is a network component that filters traffic between nodes? - ANSWER-Firewall

What is the primary purpose of log monitoring? - ANSWER-- Detect malicious
network activities

Written for

Institution
ITN 263
Course
ITN 263

Document information

Uploaded on
March 13, 2026
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$15.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
1683
Member since
3 year
Number of followers
1074
Documents
18398
Last sold
22 hours ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

457 reviews

5
216
4
79
3
91
2
21
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions