ITN 263 QUIZ 2 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
A company's cybersecurity trainer is recording a Lunch and Learn video for new employees. The trainer
discusses the dangers of spam. Besides being annoying, what other problem could spam cause? -
(ANSWER)A spam email could contain a link to what appears as a benign or beneficial website that
could, if clicked, upload malicious software to the user's computer.
A malicious person has installed ransomware on a company user's computer. The ransomware message
states that the malicious software will be removed if the user pays a certain amount of money digitally.
What is a typical form of payment? - (ANSWER)Cryptocurrency
A bank's online infrastructure has been under attack by hackers. In addition to standard security
methods, the bank's IT security manager has requested website code to be examined and modified,
where necessary, to address possible arbitrary code execution. What will the code modifications
prevent? - (ANSWER)Buffer overflows
Which type of hacker is a criminal whose career objective is to compromise IT infrastructures? -
(ANSWER)Professional
The IT security officer for a large company has spent the past year upgrading security for the corporate
network. Employees working from home have personal firewalls running on their computers. They use a
virtual private network (VPN) to connect to the corporate network. The corporate network utilizes the
latest devices and techniques, including an intrusion detection system/intrusion prevention system
(IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still needs to be
addressed? - (ANSWER)An internal threat, such as a disgruntled employee or contractor
A major social networking site has been hacked. The usernames, passwords, and security questions of
more than 500 million users were compromised. The company disclosed the breach to all users, advising
them to immediately change their passwords and security questions. The vulnerability that lead to the
breach has been discovered and patched. However, the security engineer suspects there is still a
problem left unaddressed. What is the most likely problem? - (ANSWER)The hackers may have left
malicious tools within the network that will allow them continued access.
An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to
failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the
company states that the MTTF is approximately 11 years. Because servers and some high-priority
workstations must operate continuously except for brief periods of maintenance, how many hours, on
, ITN 263 QUIZ 2 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
average, can these hard drives be expected to operate before failure? - (ANSWER)More than 90,000
hours
A chief information officer (CIO) works for a mid-sized company located on the California coast. The CIO
is developing a disaster plan for the IT infrastructure in the event of an earthquake powerful enough to
damage or destroy network and computing equipment, including the database servers. What can she do
to protect valuable company data even under the worst circumstances? - (ANSWER)Have the data
regularly backed up and stored in a secure, off-site facility not prone to such environmental dangers.
A company's IT security engineer has noticed several employees periodically checking their social media
accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the
engineer casually observes one user about to click a link to view a video, she stops the worker.
Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts
be blocked, and that only online training videos authorized by the company be allowed to be viewed.
What threat is the IT security engineer concerned about? - (ANSWER)Trojan horse
A chief financial officer's (CFO's) business account has been leaked onto the Internet, including the CFO's
username, password, and financial data. The firm's security manager scanned the CFO's computer for
viruses, which was clean. However, the manager is still convinced that the CFO's computer is somehow
compromised, allowing whatever is typed to be disclosed. The manager recalls that six weeks ago, the
CFO's assistant was caught illicitly accessing secure financial files and was subsequently dismissed. What
is the likely problem? - (ANSWER)Hardware keystroke logger
In theory, a hacker with a small but powerful directional antenna could access a wireless network from
more than one mile away. In a real-world situation, what is the more likely range involved? -
(ANSWER)Less than 1,000 feet
A mid-sized company's IT security engineer is attempting to make it more difficult for the company's
wireless network to be compromised. She is using techniques such as random challenge-response
dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-
based encryption. What form of wireless attack is she defending against? - (ANSWER)Replay
Several times this week, the IT infrastructure chief of a small company has suspected that wireless
communications sessions have been intercepted. After investigating, he believes some form of insertion
attack is happening. He is considering encrypted communications and preconfigured network access as
a defense. What type of insertion attack is suspected? - (ANSWER)Rogue device insertion
QUESTIONS WITH ANSWERS GRADED A+.
A company's cybersecurity trainer is recording a Lunch and Learn video for new employees. The trainer
discusses the dangers of spam. Besides being annoying, what other problem could spam cause? -
(ANSWER)A spam email could contain a link to what appears as a benign or beneficial website that
could, if clicked, upload malicious software to the user's computer.
A malicious person has installed ransomware on a company user's computer. The ransomware message
states that the malicious software will be removed if the user pays a certain amount of money digitally.
What is a typical form of payment? - (ANSWER)Cryptocurrency
A bank's online infrastructure has been under attack by hackers. In addition to standard security
methods, the bank's IT security manager has requested website code to be examined and modified,
where necessary, to address possible arbitrary code execution. What will the code modifications
prevent? - (ANSWER)Buffer overflows
Which type of hacker is a criminal whose career objective is to compromise IT infrastructures? -
(ANSWER)Professional
The IT security officer for a large company has spent the past year upgrading security for the corporate
network. Employees working from home have personal firewalls running on their computers. They use a
virtual private network (VPN) to connect to the corporate network. The corporate network utilizes the
latest devices and techniques, including an intrusion detection system/intrusion prevention system
(IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still needs to be
addressed? - (ANSWER)An internal threat, such as a disgruntled employee or contractor
A major social networking site has been hacked. The usernames, passwords, and security questions of
more than 500 million users were compromised. The company disclosed the breach to all users, advising
them to immediately change their passwords and security questions. The vulnerability that lead to the
breach has been discovered and patched. However, the security engineer suspects there is still a
problem left unaddressed. What is the most likely problem? - (ANSWER)The hackers may have left
malicious tools within the network that will allow them continued access.
An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to
failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the
company states that the MTTF is approximately 11 years. Because servers and some high-priority
workstations must operate continuously except for brief periods of maintenance, how many hours, on
, ITN 263 QUIZ 2 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.
average, can these hard drives be expected to operate before failure? - (ANSWER)More than 90,000
hours
A chief information officer (CIO) works for a mid-sized company located on the California coast. The CIO
is developing a disaster plan for the IT infrastructure in the event of an earthquake powerful enough to
damage or destroy network and computing equipment, including the database servers. What can she do
to protect valuable company data even under the worst circumstances? - (ANSWER)Have the data
regularly backed up and stored in a secure, off-site facility not prone to such environmental dangers.
A company's IT security engineer has noticed several employees periodically checking their social media
accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the
engineer casually observes one user about to click a link to view a video, she stops the worker.
Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts
be blocked, and that only online training videos authorized by the company be allowed to be viewed.
What threat is the IT security engineer concerned about? - (ANSWER)Trojan horse
A chief financial officer's (CFO's) business account has been leaked onto the Internet, including the CFO's
username, password, and financial data. The firm's security manager scanned the CFO's computer for
viruses, which was clean. However, the manager is still convinced that the CFO's computer is somehow
compromised, allowing whatever is typed to be disclosed. The manager recalls that six weeks ago, the
CFO's assistant was caught illicitly accessing secure financial files and was subsequently dismissed. What
is the likely problem? - (ANSWER)Hardware keystroke logger
In theory, a hacker with a small but powerful directional antenna could access a wireless network from
more than one mile away. In a real-world situation, what is the more likely range involved? -
(ANSWER)Less than 1,000 feet
A mid-sized company's IT security engineer is attempting to make it more difficult for the company's
wireless network to be compromised. She is using techniques such as random challenge-response
dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-
based encryption. What form of wireless attack is she defending against? - (ANSWER)Replay
Several times this week, the IT infrastructure chief of a small company has suspected that wireless
communications sessions have been intercepted. After investigating, he believes some form of insertion
attack is happening. He is considering encrypted communications and preconfigured network access as
a defense. What type of insertion attack is suspected? - (ANSWER)Rogue device insertion