Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 261 MIDTERM QUESTIONS & ANSWERS 100% CORRECT

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
30-06-2025
Geschreven in
2024/2025

What type of penetration testing is most often used when an organization wants to closely simulate how an attacker views a system? - ANSWERBlack-box testing Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same effect; however, a distributed denial of service (DDos) attack: - ANSWERis launched from large numbers of hosts that have been compromised and act after receiving a particular command. Which of the following terms refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator? - ANSWERIntegrity To create a digital signature, two steps take place that result in the actual signature that is sent with data. In the first step, the message or information to be sent is passed through a hashing algorithm that creates a hash to: - ANSWERverify the integrity of the message. Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a password that is a word or a name? - ANSWERDictionary password attack

Meer zien Lees minder
Instelling
ITN 261
Vak
ITN 261

Voorbeeld van de inhoud

ITN 261 MIDTERM QUESTIONS &
ANSWERS 100% CORRECT


What type of penetration testing is most often used when an organization wants to
closely simulate how an attacker views a system? - ANSWERBlack-box testing

Denial of service (DoS) and distributed denial of service (DDoS) attacks have the same
effect; however, a distributed denial of service (DDos) attack: - ANSWERis launched
from large numbers of hosts that have been compromised and act after receiving a
particular command.

Which of the following terms refers to the ability to verify that information has not been
altered and has remained in the form originally intended by the creator? -
ANSWERIntegrity

To create a digital signature, two steps take place that result in the actual signature that
is sent with data. In the first step, the message or information to be sent is passed
through a hashing algorithm that creates a hash to: - ANSWERverify the integrity of the
message.

Which password attack method uses long lists of words that have been predefined and
can be quickly downloaded for use to break a password that is a word or a name? -
ANSWERDictionary password attack

A measurement of the percentage of individuals who have gained access but should not
have been granted such is called: - ANSWERfalse acceptance rate (FAR).

Which of the following types of authentication is based on a behavioral or physiological
characteristic that is unique to an individual? - ANSWERBiometrics

Which of the following allows the placing of telephone calls over computer networks and
the Internet? - ANSWERVoice over IP (VoIP)

A measurement of the percentage of individuals who should have been granted, but
were not allowed access is called: - ANSWERfalse rejection rate (FRR).


To create a digital signature, two steps take place that result in the actual signature that
is sent with data. In the second step, the hash is passed through the encryption process
using the sender's: - ANSWERprivate key as the key in the encryption process.

, When performing a penetration test, the team should generally include members with: -
ANSWERdifferent but complementary skills.

Which of the following refers to a piece of software, a tool, or a technique that targets or
takes advantage of a vulnerability? - ANSWERExploit

Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities? -
ANSWERPenetration testing

Which of the following statements is true regarding ethical hackers? - ANSWEREthical
hackers engage in their activities only with the permission of the asset owner.

Which of the following refers to a piece of code designed to cause harm that is
intentionally inserted into a software system and will activate upon the occurrence of
some predetermined data, time, or event? - ANSWERLogic bomb

Accessing a system of computers without authorization is considered to be: -
ANSWERa network intrusion.

A major difference between a hacker and an ethical hacker is the: - ANSWERcode of
ethics to which each subscribes.

While "hacker" has become a universal term for people who break the law or break into
systems without authorization, these people are more correctly known as: -
ANSWERcrackers

A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse
lookups) is called: - ANSWERDomain Name Service (DNS).

In order to realize the full potential of a sniffer, the network card must: - ANSWERbe put
in promiscuous mode

Which of the following offers the greatest level of security for wireless networks? -
ANSWERWi-Fi Protected Access 2 (WPA2)

Which of the following is the protocol used to enable communication securely between
points on a Virtual Private Network (VPN)? - ANSWERLayer 2 Tunneling Protocol

Robot-controlled workstations that are part of a collection of other robot-controlled
workstations are called: - ANSWERbotnets

Which of the following is a distributed denial of service (DDoS) attack in which the
attacker sends a succession of SYN packets with a spoofed return address to a

Geschreven voor

Instelling
ITN 261
Vak
ITN 261

Documentinformatie

Geüpload op
30 juni 2025
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nursingismylife West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
260
Lid sinds
3 jaar
Aantal volgers
174
Documenten
9125
Laatst verkocht
1 dag geleden

3.6

38 beoordelingen

5
14
4
12
3
3
2
1
1
8

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen