Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam final ITN 266(completed)2022

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
19-08-2022
Written in
2022/2023

00:00 01:07 In ________, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest. extortion Under current U.S. federal laws, if a company allows personal information to be stolen, it may be subject to government fines. true Downloading pornography can lead to sexual harassment lawsuits. true Cyberwar consists of computer-based attacks conducted by ________. national goverments ________ can spread through e-mail attachments. both viruses and worms A program that gives the attacker remote access control of your computer is specifically called a ________. RAT In pretexting, an attacker calls claiming to be a certain person in order to ask for private information about that person. true

Show more Read less
Institution
Course

Content preview

Exam final ITN 266
Countries would engage in cyberwar - Answer Both before a physical attack and after a
physical attack
Neither before a physical attack nor after a physical attack

The definition of spam is "unsolicited commercial e-mail." - Answer true

In ________, the perpetrator tries to obtain money or other goods by threatening to take
actions that would be against the victim's interest. - Answer extortion

Under current U.S. federal laws, if a company allows personal information to be stolen,
it may be subject to government fines. - Answer true

Downloading pornography can lead to sexual harassment lawsuits. - Answer true

Cyberwar consists of computer-based attacks conducted by ________. - Answer
national goverments

________ can spread through e-mail attachments. - Answer both viruses and worms

A program that gives the attacker remote access control of your computer is specifically
called a ________. - Answer RAT

In pretexting, an attacker calls claiming to be a certain person in order to ask for private
information about that person. - Answer true

A(n) ________ attack requires a victim host to prepare for many connections, using up
resources until the computer can no longer serve legitimate users. (Choose the most
specific choice.) - Answer SYN Flooding

Mobile code usually is delivered through ________. - Answer webpages

Most cookies are dangerous. - Answer false

If a company wishes to prosecute people or companies that steal its trade secrets, it
must take ________ precautions to protect those trade secrets. - Answer reasonable

Which of the following are types of countermeasures? - Answer all of these

About how long was the Sony PlayStation Network offline as a result of the cyber
attacks? - Answer 3 weeks

Some ________ can jump directly between computers without human intervention. -
Answer worms

, The attack method used in the Sony data breaches was ________. - Answer SQL
injection

Carding is more serious than identity theft. - Answer false

________ is a generic term for "evil software." - Answer malware

When a threat succeeds in causing harm to a business, this is a(n) ________. - Answer
breach

Botnets usually have multiple owners over time. - Answer true

Which of the following are ways that trade secret espionage occur? - Answer all of
these

Another name for safeguard is ________. - Answer countermeasure

Sending packets with false IP source addresses is called ________. - Answer IP
address spoofing

Most countermeasure controls are preventative controls. - Answer true

A ________ is a type of fix for vulnerabilities. - Answer Both work-around and service
pack

A private key/public key pair is usually created by the ________. - Answer client

________ is necessary to protect the host against attacks. - Answer Host hardening

UNIX offers ________ directory and file permissions than (as) Windows. - Answer fewer

In the context of PKI, ________ is the process of accepting public keys and providing
new digital certificates to the users. - Answer provisioning

Inheritance ________ labor costs in assigning permissions. - Answer reduces

A ________ is a small device that plugs into a standard computer port to identify the
owner. - Answer USB token

________ often get their authentication information from ________. - Answer Central
authentication servers, directory servers

In Kerberos, the ________ is the supplicant's proof that it has already authenticated
itself with the Kerberos Server. - Answer ticket granting ticket

Written for

Course

Document information

Uploaded on
August 19, 2022
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5202
Member since
4 year
Number of followers
3567
Documents
55584
Last sold
10 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions