Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Information Security Fundamentals Final Exam Study Guide WITH ANSWERS.

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
14-04-2026
Written in
2025/2026

Information Security Fundamentals Final Exam Study Guide WITH ANSWERS.

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals

Content preview

Information Security Fundamentals
Final Exam Study Guide WITH
ANSWERS


Which password attack is typically used specifically
against password files that contain cryptographic hashes?
- CORRECT ANSWERS ✔✔Birthday Attacks


Brian notices an attack taking place on his network. When
he digs deeper, he realizes that the attacker has a
physical presence on the local network and is forging
Media Access Control (MAC) addresses. Which type of
attack is most likely taking place? - CORRECT ANSWERS
✔✔Address Resolution Protocol (ARP) poisoning


In which type of attack does the attacker attempt to take
over an existing connection between two systems? -
CORRECT ANSWERS ✔✔Session Hijacking


Which group is the most likely target of a social
engineering attack? - CORRECT ANSWERS
✔✔Receptionists and administrative assistants

,What type of malicious software masquerades as
legitimate software to entice the user to run it? -
CORRECT ANSWERS ✔✔Trojan


An attacker attempting to break into a facility pulls the
fire alarm to distract the security guard manning an entry
point. Which type of social engineering attack is the
attacker using? - CORRECT ANSWERS ✔✔Urgency


Barry discovers that an attacker is running an access
point in a building adjacent to his company. The access
point is broadcasting the security set identifier (SSID) of
an open network owned by the coffee shop in his lobby.
Which type of attack is likely taking place? - CORRECT
ANSWERS ✔✔Evil Twin


Which type of attack against a web application uses a
newly discovered vulnerability that is not patchable? -
CORRECT ANSWERS ✔✔Zero-day attack


Which control is not designed to combat malware? -
CORRECT ANSWERS ✔✔Firewall


Florian recently purchased a set of domain names that
are similar to those of legitimate websites and used the
newly purchased sites to host malware. Which type of

, attack is Florian using? - CORRECT ANSWERS
✔✔Typosquatting


Which formula is typically used to describe the
components of information security risks? - CORRECT
ANSWERS ✔✔Risk = Threat X Vulnerability


Earl is preparing a risk register for his organization's risk
management program. Which data element is LEAST
likely to be included in a risk register? - CORRECT
ANSWERS ✔✔Risk survey results


Alan is developing a business impact assessment for his
organization. He is working with business units to
determine the maximum allowable time to recover a
particular function. What value is Alan determining? -
CORRECT ANSWERS ✔✔Recovery time objective (RTO)


Which one of the following is an example of a direct cost
that might result from a business disruption? - CORRECT
ANSWERS ✔✔Facility Repair


Tom is the IT manager for an organization that
experienced a server failure that affected a single
business function. What type of plan should guide the

Written for

Institution
Computer Security Fundamentals
Course
Computer Security Fundamentals

Document information

Uploaded on
April 14, 2026
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$23.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EXAMSTUDYPLUG Stanford University
Follow You need to be logged in order to follow users or courses
Sold
354
Member since
3 year
Number of followers
107
Documents
20394
Last sold
1 week ago
GRADE BUDDY

Welcome to My Page! Are you looking for high-quality study resources to ace your exams or better understand your coursework? You've come to the right place! I'm passionate about sharing my knowledge and helping students succeed academically. Here, you'll find a wide range of well-organized notes, study guides, and helpful materials across various subjects, including Maths ,nursig, Biology, History, etc.. Each resource is carefully crafted with detailed explanations, clear examples, and relevant key points to help simplify complex concepts. Whether you're preparing for a test, reviewing lectures, or need extra support, my resources are designed to make your learning experience smoother and more effective. Let me be a part of your academic journey, and feel free to reach out if you have any questions or need personalized assistance!

Read more Read less
4.5

238 reviews

5
161
4
51
3
14
2
5
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions