ISSC262 MidTerm Exam - Results Fall 2023.
ISSC262 MidTerm Exam - Results Attempt 1 of 1 Written Aug 30, 2023 8:18 PM - Aug 30, 2023 8:34 PM Attempt Score 88 / 100 - 88 % Overall Grade (Highest Attempt) 88 / 100 - 88 % stion 1 4 / 4 po Sniffing can be used to ___________. Question options: troubleshoot connections investigate malware detect abnormal behavior All of the above PSK mode is ___________. Question options: a pre-salted key a pre-shared key more secure enterprise ready The characteristics of Ethernet include all but which one of the following? Question options: Collision detection Sends traffic to all nodes on a hub CSMA/CD Sends traffic using a token Checking DNS for words like "test" or "solaris" is an example of a technique for which of the following activities? Question options: Identify potential targets. Remove unwanted listings. Make sure you found the right company. Check the zone file. Deploying an IDS into an environment for which it is not designed can fail for which of the following reasons? Question options: Warnings may be incorrect Warnings may be irrelevant Both A and B Neither A nor B Filtering user input to remove HTML and script tags can help prevent which of the following attacks? Question options: CSS XSRF SQL injection All of the above CCTV can be used as which of the following type of tools? Question options: Detective only Preventive only Detective and reactive Reactive and preventative A skilled hacker who sometimes acts illegally and sometimes acts with good intent is a ________. Question options: white hat black hat gray hat criminal A SYN scan is useful for which of the following purposes? Question options: Checking for FIN flags Detecting open connections without completing the TCP handshake Sending packets with no flags set Sending packets with all flags set The Sarbanes-Oxley Act governs what type of reporting? Question options: Newspaper Security Financial Governmental The main purposes for using cryptography include all but which one of the following? Question options: Privacy Authenticity Integrity Availability Approximately how many distributions of Linux are available in different forms and formats? Question options: 100 200 1,000 2,000 At which layer of the TCP/IP model are virus scanners and secure coding used as control measures? Question options: Application Host-to-Host Network Physical An attacker who adds commands to a database query has likely used ___________. Question options: SQL injection command overload SQL addition database override Focal length defines which of the following camera qualities? Question options: Degree of granularity Ability to zoom Scope of color Horizontal and vertical view A false acceptance rate is also known as which of the following errors? Question options: Type A Type B Type 1 Type 2 In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first? Question options: LACNIC APNIC RIPE ARIN In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued? Question options: dir/p ls -l cp -v rm -al Inserting scriptaction/script is an example of what type of Web attack? Question options: Cross-site scripting Database attack SQL injection Sample file exploit The core component of every operating system is which of the following? Question options: Kernel Shell User interface BIOS A standard format for reporting a security incident prevents which of the following? Question options: Missing data Copy and paste errors The same type of incident in the future Incomplete risk assessments Inserting code, such as script src= which of the following? Question options: SQL injection Cross-site scripting Cross-site reference forgery Brute-force attacks Vulnerabilities in the database platform are best handled by using which of the following controls? Question options: Patching Firewalling Use nonstandard ports, if possible All of the above Single Correct - points EditNessus® is a __________. Question options: vulnerability scanner port scanner XSS scanner Web scanner Factors that affect the emanations of a wireless network include all but which one of the following? Question options: Atmospheric conditions Building materials Sound vibrations Nearby devices
Geschreven voor
- Instelling
- American Military University
- Vak
- ISSC 262 (ISSC262)
Documentinformatie
- Geüpload op
- 5 september 2023
- Aantal pagina's
- 8
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
issc 262
-
issc262 midterm
-
issc 262 midterm
-
issc262 midterm exam
-
sniffing can be used to
-
psk mode is