Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 260 Midterm Questions and Verified Answers

Beoordeling
-
Verkocht
-
Pagina's
42
Cijfer
A+
Geüpload op
27-07-2025
Geschreven in
2024/2025

ITN 260 Midterm Questions and Verified Answers

Instelling
ITN 260
Vak
ITN 260

Voorbeeld van de inhoud

Page | 1




ITN 260 Midterm Questions and Verified
Answers

Question: The Security Administrator reports directly to the CIO.

Ans: False


Question: The CompTIA Security+ certification is a vendor-neutral credential.

Ans: True


Question: Successful attacks are usually not from software that is poorly designed and has
architecture/design weaknesses.

Ans: False


Question: Smart phones give the owner of the device the ability to download security
updates.

Ans: False


Question: As security is increased, convenience is often increased.

Ans: False


Question: A vulnerability is a flaw or weakness that allows a threat to bypass security.

Ans: True


Question: To mitigate risk is the attempt to address risk by making the riskless serious.

Ans: True


Question: The Sarbanes-Oxley Act restricts electronic and paper data containing personally
identifiable financial information.

Ans: False


Question: One of the challenges in combating cyberterrorism is that many of the prime
targets are not owned and managed by the federal government.

, Page | 2


Ans: True


Question: Brokers steal new product research or a list of current customers to gain a
competitive advantage.

Ans: False


Question: What information security position reports to the CISO and supervises
technicians, administrators, and security staff?

Ans: Security Manager


Question: According to the U.S. Bureau of Labor Statistics, what percentage of growth for
information security analysts is the available job outlook supposed to reach through 2024?

Ans: 18


Question: Which position below is considered an entry-level position for a person who has
the necessary technical skills?

Ans: Security Technician


Question: What term refers to an action that provides an immediate solution to a problem
by cutting through the complexity that surrounds it?

Ans: Silver Bullet


Question: In what kind of attack can attackers make use of millions of computers under
their control in an attack against a single server or network?

Ans: Distributed


Question: Which term below is frequently used to describe the tasks of securing that is in a
digital format?

Ans: Information Security


Question: Which of the three protections ensures that only authorized parties can view
information?

Ans: Confidentiality

, Page | 3


Question: Select the information protection item that ensures that information is correct
and that no unauthorized person or malicious software has altered that data

Ans: Integrity


Question: Which of the following ensures that data is accessible to authorized users?

Ans: Availability


Question: In information security, what can constitute a loss?

Ans: All of the above


Question: In information security, which of the following is an example of a threat actor?

Ans: All of the above


Question: What type of theft involves stealing another person's personal information, such
as a Social Security number, and then using the information to impersonate the victim,
generally for financial gain?

Ans: Identity Theft


Question: Under which laws are healthcare enterprises required to guard protected health
information and implement policies and procedures whether it be in paper or electronic
format?

Ans: HIPAA


Question: Those who wrongfully disclose individually identifiable health information can
be fined up to what amount per calendar year?

Ans: 1,500,000


Question: Which law requires banks and financial institutions to alert customers of their
policies and practices in disclosing customer information?

Ans: Gramm-Leach-Bliley


Question: To date, the single most expensive malicious attack occurred in 2000, which cost
an estimated $8.7 billion. What was the name of this attack?

Ans: Love Bug

, Page | 4


Question: What term is used to describe a group that is strongly motivated by ideology, but
is usually not considered to be well-defined and well-organized?

Ans: Hactivists


Question: Which term is used to describe individuals who want to attack computers yet
lack the knowledge of computers and networks needed to do so?

Ans: script kiddies


Question: Select the term that best describes automated attack software?

Ans: open-source intelligence


Question: What class of attacks use innovative attack tools and once a system is infected it
silently extracts data over an extended period?

Ans: Advanced Persistent Threat


Question: What term is used to describe state-sponsored attackers that are used for
launching computer attacks against their foes?

Ans: nation state actors


Question: What term describes a layered security approach that provides the
comprehensive protection?

Ans: Defense-in-depth


Question: What process describes using technology as a basis for controlling the access and
usage of sensitive data?

Ans: technical controls


Question: What type of diversity is being implemented if a company is using multiple
security products from different manufacturers?

Ans: Vendor Diversity


Question: What level of security access should a computer user have to do their job?

Ans: Least amount

Geschreven voor

Instelling
ITN 260
Vak
ITN 260

Documentinformatie

Geüpload op
27 juli 2025
Aantal pagina's
42
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
StudyRM

Maak kennis met de verkoper

Seller avatar
StudyRM University Of California - Los Angeles (UCLA)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
10 maanden
Aantal volgers
0
Documenten
4113
Laatst verkocht
3 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen