Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 263 QUIZ2NETWORKING& CYBERINFRASTRUCTUREEXAM 2026 LATESTUPDATED QUESTIONSWITHANSWERSA+.

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
27-03-2026
Geschreven in
2025/2026

ITN 263 QUIZ2NETWORKING& CYBERINFRASTRUCTUREEXAM 2026 LATESTUPDATED QUESTIONSWITHANSWERSA+.

Instelling
ITN 263
Vak
ITN 263

Voorbeeld van de inhoud

ITN 263 QUIZ 2 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.



A company's cybersecurity trainer is recording a Lunch and Learn video for new employees. The trainer
discusses the dangers of spam. Besides being annoying, what other problem could spam cause? -
(ANSWER)A spam email could contain a link to what appears as a benign or beneficial website that
could, if clicked, upload malicious software to the user's computer.



A malicious person has installed ransomware on a company user's computer. The ransomware message
states that the malicious software will be removed if the user pays a certain amount of money digitally.
What is a typical form of payment? - (ANSWER)Cryptocurrency



A bank's online infrastructure has been under attack by hackers. In addition to standard security
methods, the bank's IT security manager has requested website code to be examined and modified,
where necessary, to address possible arbitrary code execution. What will the code modifications
prevent? - (ANSWER)Buffer overflows



Which type of hacker is a criminal whose career objective is to compromise IT infrastructures? -
(ANSWER)Professional



The IT security officer for a large company has spent the past year upgrading security for the corporate
network. Employees working from home have personal firewalls running on their computers. They use a
virtual private network (VPN) to connect to the corporate network. The corporate network utilizes the
latest devices and techniques, including an intrusion detection system/intrusion prevention system
(IDS/IPS), anti-malware protection, and firewalls. What security threat most likely still needs to be
addressed? - (ANSWER)An internal threat, such as a disgruntled employee or contractor



A major social networking site has been hacked. The usernames, passwords, and security questions of
more than 500 million users were compromised. The company disclosed the breach to all users, advising
them to immediately change their passwords and security questions. The vulnerability that lead to the
breach has been discovered and patched. However, the security engineer suspects there is still a
problem left unaddressed. What is the most likely problem? - (ANSWER)The hackers may have left
malicious tools within the network that will allow them continued access.



An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to
failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the
company states that the MTTF is approximately 11 years. Because servers and some high-priority
workstations must operate continuously except for brief periods of maintenance, how many hours, on

, ITN 263 QUIZ 2 NETWORKING& CYBER INFRASTRUCTURE EXAM 2026 LATEST UPDATED
QUESTIONS WITH ANSWERS GRADED A+.



average, can these hard drives be expected to operate before failure? - (ANSWER)More than 90,000
hours



A chief information officer (CIO) works for a mid-sized company located on the California coast. The CIO
is developing a disaster plan for the IT infrastructure in the event of an earthquake powerful enough to
damage or destroy network and computing equipment, including the database servers. What can she do
to protect valuable company data even under the worst circumstances? - (ANSWER)Have the data
regularly backed up and stored in a secure, off-site facility not prone to such environmental dangers.



A company's IT security engineer has noticed several employees periodically checking their social media
accounts. One such platform allows chat, which can include sharing links, photos, and videos. When the
engineer casually observes one user about to click a link to view a video, she stops the worker.
Afterward, she approaches the chief information officer (CIO) and advises that all social media accounts
be blocked, and that only online training videos authorized by the company be allowed to be viewed.
What threat is the IT security engineer concerned about? - (ANSWER)Trojan horse



A chief financial officer's (CFO's) business account has been leaked onto the Internet, including the CFO's
username, password, and financial data. The firm's security manager scanned the CFO's computer for
viruses, which was clean. However, the manager is still convinced that the CFO's computer is somehow
compromised, allowing whatever is typed to be disclosed. The manager recalls that six weeks ago, the
CFO's assistant was caught illicitly accessing secure financial files and was subsequently dismissed. What
is the likely problem? - (ANSWER)Hardware keystroke logger



In theory, a hacker with a small but powerful directional antenna could access a wireless network from
more than one mile away. In a real-world situation, what is the more likely range involved? -
(ANSWER)Less than 1,000 feet



A mid-sized company's IT security engineer is attempting to make it more difficult for the company's
wireless network to be compromised. She is using techniques such as random challenge-response
dialogue for authentication, timestamps on authentication exchanges, and one-time pad or session-
based encryption. What form of wireless attack is she defending against? - (ANSWER)Replay



Several times this week, the IT infrastructure chief of a small company has suspected that wireless
communications sessions have been intercepted. After investigating, he believes some form of insertion
attack is happening. He is considering encrypted communications and preconfigured network access as
a defense. What type of insertion attack is suspected? - (ANSWER)Rogue device insertion

Geschreven voor

Instelling
ITN 263
Vak
ITN 263

Documentinformatie

Geüpload op
27 maart 2026
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursAid Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2099
Lid sinds
11 maanden
Aantal volgers
9
Documenten
1522
Laatst verkocht
2 weken geleden

I OFFER QUALITY A+ GRADED DOCS....WELCOME ALL

5.0

261 beoordelingen

5
253
4
6
3
2
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen