Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 261 - CHAP 3 QUESTIONS & ANSWERS (RATED A+)

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
30-06-2025
Geschreven in
2024/2025

To remove malware from the network before it gets to the endpoint, you would use which of the following? Packet filter Application layer gateway Unified threat management appliance Stateful firewall - ANSWERC. Packet filters are used to make block/allow decisions based on header data like source and destination address and port. Stateful firewalls add in the ability to factor in the state of the connection—new, related, established. An Application layer gateway knows about Application layer protocols. A unified threat management appliance adds additional capabilities on top of firewall functions, including antivirus. Why is it important to store system logs remotely? Local systems can't handle it. Bandwidth is faster than disks. Attackers might delete local logs. It will defend against attacks. - ANSWERC. Commonly, system logs are stored on the system that generated the log message. Certainly local systems can handle the logs they have generated. Log messages don't typically consume a lot of space at an individual message level, so bandwidth isn't a problem. Transmitting over a network is generally not faster than moving data within local disks. System logs can be used in identifying attacks, but the logs won't defend against attacks. However, if an attacker does compromise a system, the attacker may delete the local logs because they could get access to them.

Meer zien Lees minder
Instelling
ITN 261 - CHAP
Vak
ITN 261 - CHAP

Voorbeeld van de inhoud

ITN 261 - CHAP 3 QUESTIONS &
ANSWERS (RATED A+)



To remove malware from the network before it gets to the endpoint, you would use
which of the following?

Packet filter
Application layer gateway
Unified threat management appliance
Stateful firewall - ANSWERC. Packet filters are used to make block/allow decisions
based on header data like source and destination address and port. Stateful firewalls
add in the ability to factor in the state of the connection—new, related, established. An
Application layer gateway knows about Application layer protocols. A unified threat
management appliance adds additional capabilities on top of firewall functions, including
antivirus.

Why is it important to store system logs remotely?

Local systems can't handle it.
Bandwidth is faster than disks.
Attackers might delete local logs.
It will defend against attacks. - ANSWERC. Commonly, system logs are stored on the
system that generated the log message. Certainly local systems can handle the logs
they have generated. Log messages don't typically consume a lot of space at an
individual message level, so bandwidth isn't a problem. Transmitting over a network is
generally not faster than moving data within local disks. System logs can be used in
identifying attacks, but the logs won't defend against attacks. However, if an attacker
does compromise a system, the attacker may delete the local logs because they could
get access to them.



If you were on a client engagement and discovered that you left an external hard drive
with essential data on it at home, which security principle would you be violating?

Confidentiality
Integrity
Non-repudiation

, Availability - ANSWERD. Confidentiality is about making sure secrets are kept secret.
Integrity makes sure that data isn't altered accidentally or by an unauthorized agent.
Non-repudiation makes sure someone can't say a message didn't originate with them if
it came from their identity. Availability means making sure data is where it needs to be
when it should be there. This includes services as well.
Which of these isn't an example of an attack that compromises integrity?

Buffer overflow
Man in the middle
Heap spraying
Watering hole - ANSWERD. A buffer overflow attack is used to execute attacker-
supplied code by altering the return address in the stack. A man in the middle attack
can be used to intercept and potentially alter a conversation between two systems. A
heap spraying attack sends a lot of data into the heap to overwrite what's there. A
watering hole attack does not compromise integrity since its purpose is to introduce
malware to a system. The malware might eventually compromise integrity, but the
watering hole attack itself does not.

How would you calculate risk?

Probability * loss value
Probability * mitigation factor
(Loss value + mitigation factor) * (loss value/probability)
Probability * mitigation factor - ANSWERA. Risk is the probability of the occurrence of
an event multiplied by the dollar value of loss. There is no mitigation factor that is
quantified, so it could be put into a risk calculation.

Which of the following is one factor of a defense in depth approach to network design?

Switches
Using Linux on the desktop
Optical cable connections
Access control lists on routers - ANSWERD. Switches and optical cable connections
can certainly be part of a network design, but in and of themselves they don't add any
security features. You may use Linux on the desktop, but without more of a strategy for
patch and vulnerability management, Linux is no better than other operating systems.
Access control lists on routers can add an additional layer of security, especially when
combined with other elements like firewalls and intrusion detection systems.

How would you ensure that confidentiality is implemented in an organization?

Watchdog processes
Encryption
Cryptographic hashes
Web servers - ANSWERB. Confidentiality is keeping secret information secret, which
means unauthorized users can't access it. Encryption is a good way to keep

Geschreven voor

Instelling
ITN 261 - CHAP
Vak
ITN 261 - CHAP

Documentinformatie

Geüpload op
30 juni 2025
Aantal pagina's
6
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$14.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
nursingismylife West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
260
Lid sinds
3 jaar
Aantal volgers
174
Documenten
9125
Laatst verkocht
1 week geleden

3.6

38 beoordelingen

5
14
4
12
3
3
2
1
1
8

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen