Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 263 FINAL QUESTIONS WITH VERIFIED ANSWERS

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
13-03-2026
Written in
2025/2026

ITN 263 FINAL QUESTIONS WITH VERIFIED ANSWERSITN 263 FINAL QUESTIONS WITH VERIFIED ANSWERSITN 263 FINAL QUESTIONS WITH VERIFIED ANSWERSITN 263 FINAL QUESTIONS WITH VERIFIED ANSWERSWhat is an example of security through obscurity? - ANSWER-Using a nonstandard operating system for workstations such as FreeBSD Rachel is the cybersecurity engineer for a company that fulfills government contracts on Top Secret projects. She needs to find a way to send highly sensitive information by email in a way that won't arouse the suspicion of malicious parties. If she encrypts the emails, everyone will assume they contain confidential information. What is her solution? - ANSWER-Hide messages in the company's logo within the email. Jacob is a network technician who works for a publishing company. He is setting up a new hire's access permissions. The new hire, Latisha, is an editor. She needs access to books that have been accepted for publication but are in the review stage. Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. What principle is Jacob applying? - ANSWER-The principle of least privilege

Show more Read less
Institution
ITN 263
Course
ITN 263

Content preview

ITN 263 FINAL QUESTIONS WITH
VERIFIED ANSWERS
What is an example of security through obscurity? - ANSWER-Using a nonstandard
operating system for workstations such as FreeBSD

Rachel is the cybersecurity engineer for a company that fulfills government contracts
on Top Secret projects. She needs to find a way to send highly sensitive information
by email in a way that won't arouse the suspicion of malicious parties. If she encrypts
the emails, everyone will assume they contain confidential information. What is her
solution? - ANSWER-Hide messages in the company's logo within the email.

Jacob is a network technician who works for a publishing company. He is setting up
a new hire's access permissions. The new hire, Latisha, is an editor. She needs
access to books that have been accepted for publication but are in the review stage.
Jacob gives her access to the network drive containing only books in review, but not
access to administrative or human resources network drives. What principle is Jacob
applying? - ANSWER-The principle of least privilege

Which of the following is described as an approach to network security in which each
administrator is given sufficient privileges only within a limited scope of
responsibility? - ANSWER-separation of duties

Landon is a network contractor. He has been hired to design security for the network
of a small company. The company has a limited budget. Landon is asked to create a
system that will protect the company's workstations and servers without undo
expense. Landon decides to deploy one hardware firewall between the Internet and
the local area network (LAN). What is this solution called? - ANSWER-single
defense

Which of the following can be described as putting each resource on a dedicated
subnet behind a demilitarized zone (DMZ) and separating it from the internal local
area network (LAN)? - ANSWER-n tier deployment

Alejandro is a cybersecurity contractor. He was hired by a Fortune 500 company to
redesign its network security system, which was originally implemented when the
company was a much smaller organization. The company's current solution is to use
multiple firewall platforms from different vendors to protect internal resources.
Alejandro proposes an infrastructure security method that, in addition to firewalls,
adds tools such as an intrusion detection system (IDS), antivirus, strong
authentication, virtual private network (VPN) support, and granular access control.
What is this solution called? - ANSWER-diversity of defense

a filter pathway is designed to - ANSWER-make it hard to bybass a network filtering
system and forece all traffic through one route

,Joaquin is a senior network technician for a mid-sized company who has been
assigned the task of improving security for the IT infrastructure. He has been given a
limited budget and must increase security without redesigning the network or
replacing all internetworking security devices. He focuses on an approach that will
identify a single vulnerability. What does he recommend? - ANSWER-weakest link

A company vice president (VP) finds that the network security restrictions imposed
by the security manager are too confining. To counter them, the VP habitually uses
weak passwords, shares accounts with his assistant, and installed unapproved
software. What security principle is the VP violating? - ANSWER-universal
participation

Amy is a network engineering consultant. She is designing security for a small to
medium-sized government contractor working on a project for the military. The
government contractor's network is comprised of 30 workstations plus a wireless
printer, and it needs remote authentication. Which of the following is a type of
authentication solution she should deploy? - ANSWER-radius

Which of the following is an authentication method that supports smart cards,
biometrics, and credit cards, and is a fully scalable architecture? - ANSWER-802.1x

Which of the following is unlikely to support at-firewall authentication? - ANSWER-
DMZ

Carl is a network engineer for a mid-sized company. He has been assigned the task
of positioning hardware firewalls in the IT infrastructure based on common pathways
of communication. After analyzing the problem, on which aspect of the network does
he base his design? - ANSWER-traffic patterns

What is the basic service of a reverse proxy? - ANSWER-hides the identity of a web
server accessed by a client over the internet

Which of the following is a firewall, proxy, and routing service that does NOT support
caching, encryption endpoint, or load balancing? Note that this service can be found
on almost any service or device that supports network address translation. -
ANSWER-port forwarding

Before an Internet user can access a demilitarized zone (DMZ), extranet, or private
network resource, it first encounters an entity that is sturdy enough to withstand any
sort of attack. What is this entity called? - ANSWER-bastion host operating system

Which operating system (OS) for a bastion host runs on most appliance firewalls as
well as many Internet service provider (ISP) connection devices? - ANSWER-
proprietary OS

The combination of certain techniques allows for relevant information collected by
this solution from multiple systems and processes to be aggregated and analyzed for
use in decision making. What is the name of this solution? - ANSWER-/SIEM

, What is an intrusion detection system/intrusion prevention system (IDS/IPS) that
uses patterns of known malicious activity similar to how antivirus applications work? -
ANSWER-database based detection

Security systems configured by the same security administrator can potentially have
the same misconfiguration or design weakness. - ANSWER-true

The weakest link security strategy gains protection by using abnormal configurations.
- ANSWER-false

users with the minimum level of access to resources needed to complete their
assigned tasks follow the principle of least privilege. - ANSWER-true

The less complex a solution, the more room there is for mistakes, bugs, flaws, or
oversights by security administrators. - ANSWER-false

When the defense in depth security strategy is followed, a single component failure
does not result in compromise or intrusion. - ANSWER-true

In an N-tier deployment, multiple subnets are deployed in series to separate private
resources from public. - ANSWER-true

With diversity of defense, most layers use a different security mechanism. -
ANSWER-true

Multiple firewalls in a series is considered diversity of defense but not defense in
depth. - ANSWER-false

A drawback of multiple-vendor environments is the amount of network staff training
that is typically needed. - ANSWER-true

In the fail-safe security stance, when any aspect of security fails, the best result of
that failure is to fail into a state that supports or maintains essential security
protections. - ANSWER-true

An intrusion detection system (IDS) serves as a companion mechanism to a firewall.
- ANSWER-true

Reverse proxy is a firewall service that allows external users access to internally
hosted web resources. - ANSWER-true

Under the universal participation security stance, every employee, consultant,
vendor, customer, business partner, and outsider must be forced to work within the
security policy's limitations. - ANSWER-true

Firewall logging helps to ensure that defined filters or rules are sufficient and
functioning as expected. - ANSWER-true

One common firewall event that usually warrants an alert is a firewall reboot. -
ANSWER-true

Written for

Institution
ITN 263
Course
ITN 263

Document information

Uploaded on
March 13, 2026
Number of pages
27
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
1681
Member since
3 year
Number of followers
1074
Documents
18361
Last sold
1 week ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

457 reviews

5
216
4
79
3
91
2
21
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions