Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 262 MIDTERM EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
2
Cijfer
A+
Geüpload op
16-05-2026
Geschreven in
2025/2026

ITN 262 MIDTERM EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 What is a worm - Answers Malware An attempt by a threat agent to exploit assets without permission is referred to as - Answers an attack This yields a more specific set of attacks tied to our particular threat agents - Answers attack matrix CIA properties do not include - Answers authentication AUP stands for - Answers acceptable use policy Zero Day vulnerability is one that has been reported to the software's vendor and the general public - Answers false A person skilled in attacking computer systems, who uses those skills as a security expert to help protect systems is a - Answers white hat hacker A security analyst is performing a security assessment, the analyst should not - Answers take action to mitigate a serious risk victims can protect themselves against zero day attacks - Answers false When you analyze a system using the six-phase security process you are performing a - Answers risk assessment An attack in which someone tries to trick a system administrator into divulging a password is called - Answers social engineering authentication does what - Answers associated and individual with and identity An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of - Answers two-factor authentication there are three types of tokens they do not include - Answers offensive tokens the most recent list hash algorithm is what - Answers SHA-512 The following are associated with a weak threat except - Answers all are associated with weak threats Hashing - Answers transforms readable text into gibberish in a password system the total number of possible passwords is - Answers search space An attack the blocks access to a system by other users is called - Answers denial of service something you know, something you have and something you are....something you make is not - Answers fundamental strategies for authenticating people The type of cypher that rearranges the text of a message is called a - Answers transposition cipher The Enigma was - Answers a rotor machine File encryption on a computers hard drive involves what risk - Answers all of the answers Hiding an object, such as a diary to prevent other from finding it is an example of - Answers security through obscurity Encryption protects information by presenting - Answers a key AES was introduced in - Answers 2002 AN encryption algorithm that uses the same key for both encryption and decryption is - Answers symmetric to use symmetric cryptography , the sender and receiver must share - Answers a secret key Moore's Law observed that computing power will double every - Answers 18 months The process of decrypting is - Answers Cryptanalysis Digital signatures are often used to provide - Answers Nonrepudiation In diffie helllman calculation using P=g^s mod N, s= - Answers the private key value An Advanced Encryption Standard (AES) key may not be - Answers 16 bits Encrypting an encryption key using a passphrase is called - Answers Key wrapping A public key certificate generally does not contain - Answers A private key SHA-1 produces a _________ bit message digest, which can then be used as an input to a digital algorithm. - Answers 160 Using the Diffie-Hellman algorithm - Answers both participants in the exchange must have a public/private key pair What was the first web browser to use public key certificates - Answers Netscape Navigator PGP implemented a ________________ making it so that no single persosn was universally trusted to sign certificates - Answers Web of trust The method used to encrypt with multiple ciphers is called - Answers KEK What is SCADA associated with? - Answers Utilities What does CIA stand for? - Answers confidentiality, Integrity, availibity What is an example of reasoned paranoia? - Answers locking your car door What is a security architecture study? - Answers a security plan that focuses on security requirements and implimentaion What is an example of a rule-based decision? - Answers car ignition locks What are threat agents - Answers method used to breach the system An algorithm is a - Answers procedure

Meer zien Lees minder
Instelling
ITN 262
Vak
ITN 262

Voorbeeld van de inhoud

ITN 262 MIDTERM EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

What is a worm - Answers Malware
An attempt by a threat agent to exploit assets without permission is referred to as - Answers an
attack
This yields a more specific set of attacks tied to our particular threat agents - Answers attack matrix
CIA properties do not include - Answers authentication
AUP stands for - Answers acceptable use policy
Zero Day vulnerability is one that has been reported to the software's vendor and the general public -
Answers false
A person skilled in attacking computer systems, who uses those skills as a security expert to help
protect systems is a - Answers white hat hacker
A security analyst is performing a security assessment, the analyst should not - Answers take action
to mitigate a serious risk
victims can protect themselves against zero day attacks - Answers false
When you analyze a system using the six-phase security process you are performing a - Answers risk
assessment
An attack in which someone tries to trick a system administrator into divulging a password is called -
Answers social engineering
authentication does what - Answers associated and individual with and identity
An authentication system that requires the user to provide two different passwords and a fingerprint
scan is an example of - Answers two-factor authentication
there are three types of tokens they do not include - Answers offensive tokens
the most recent list hash algorithm is what - Answers SHA-512
The following are associated with a weak threat except - Answers all are associated with weak threats
Hashing - Answers transforms readable text into gibberish
in a password system the total number of possible passwords is - Answers search space
An attack the blocks access to a system by other users is called - Answers denial of service
something you know, something you have and something you are....something you make is not -
Answers fundamental strategies for authenticating people
The type of cypher that rearranges the text of a message is called a - Answers transposition cipher
The Enigma was - Answers a rotor machine
File encryption on a computers hard drive involves what risk - Answers all of the answers
Hiding an object, such as a diary to prevent other from finding it is an example of - Answers security
through obscurity
Encryption protects information by presenting - Answers a key
AES was introduced in - Answers 2002
AN encryption algorithm that uses the same key for both encryption and decryption is - Answers
symmetric
to use symmetric cryptography , the sender and receiver must share - Answers a secret key
Moore's Law observed that computing power will double every - Answers 18 months
The process of decrypting is - Answers Cryptanalysis
Digital signatures are often used to provide - Answers Nonrepudiation
In diffie helllman calculation using P=g^s mod N, s= - Answers the private key value
An Advanced Encryption Standard (AES) key may not be - Answers 16 bits
Encrypting an encryption key using a passphrase is called - Answers Key wrapping
A public key certificate generally does not contain - Answers A private key
SHA-1 produces a _________ bit message digest, which can then be used as an input to a digital
algorithm. - Answers 160
Using the Diffie-Hellman algorithm - Answers both participants in the exchange must have a
public/private key pair
What was the first web browser to use public key certificates - Answers Netscape Navigator
PGP implemented a ________________ making it so that no single persosn was universally trusted to
sign certificates - Answers Web of trust
The method used to encrypt with multiple ciphers is called - Answers KEK
What is SCADA associated with? - Answers Utilities
What does CIA stand for? - Answers confidentiality, Integrity, availibity

Geschreven voor

Instelling
ITN 262
Vak
ITN 262

Documentinformatie

Geüpload op
16 mei 2026
Aantal pagina's
2
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
1 jaar
Aantal volgers
1
Documenten
14118
Laatst verkocht
3 uur geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.9

9 beoordelingen

5
4
4
1
3
3
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen