IST 317 FINAL EXAM STUDY GUIDE
WELL ANSWERED
Which management system implements systems that track the location and configuration of
networked devices and software across an enterprise? - correct answer ✔✔
What percentage of the physical memory is in use on this windows system? - correct answer
✔✔
What is the most common use of the Diffie-Helman algorithm in communications security? -
correct answer ✔✔To secure the exchange of keys used to encrypt data
Which method can be used to harden a device? - correct answer ✔✔Force periodic password
change
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing
on their compute screens. What could be a reason that computers are displaying these random
graphics? - correct answer ✔✔
What is reconnaissance? - correct answer ✔✔Active reconnaissance is a type of computer
attack in which an intruder engages with the targeted system to gather information about
vulnerabilities. The word reconnaissance is borrowed from its military use, where it refers to a
mission into enemy territory to obtain information.
What are three functions provided by the syslog service? - correct answer ✔✔
Which two options are security best practices the help mitigate BYOD risk? - correct answer ✔✔
, What is the first step the wireless client will do in order to communicate over the network using
a wireless management frame? - correct answer ✔✔
a utility does not automatically start whenever the computer is started. What can the technician
do to resolve this problem? - correct answer ✔✔
Which host based fire-wall uses a three-profile approach to configure the firewall functionality?
- correct answer ✔✔
Which component in linux is responsible for interacting directly with the device hardware? -
correct answer ✔✔
Which statement describe the cyber kill chain? - correct answer ✔✔It is a set of metrics
designed to create a way to describe security incidents in a structured and repeatable way
Which schema or model allows security professionals to enter data about a particular incident,
such as victim demographics, incident descriptions, discovery method and response, and impact
assessment, and share that data with the security community anonymously? - correct answer
✔✔
What is the responsibility of the IT support group when handling a security incident? - correct
answer ✔✔
Which value, that is contained in an IPV4 header field, is decremented by each router that
receives a packet? - correct answer ✔✔Time-to-live. When a router receives a packet, the
router will decrement the time-to-live field by one. When the field reaches zero, the receiving
router will discard the packet and will send an ICMP time exceeded message to the sender.
Whih statment describes the state of the adminsitrator and guest accounts after a user instal
windows desktop version to a new computer? - correct answer ✔✔By default both the
WELL ANSWERED
Which management system implements systems that track the location and configuration of
networked devices and software across an enterprise? - correct answer ✔✔
What percentage of the physical memory is in use on this windows system? - correct answer
✔✔
What is the most common use of the Diffie-Helman algorithm in communications security? -
correct answer ✔✔To secure the exchange of keys used to encrypt data
Which method can be used to harden a device? - correct answer ✔✔Force periodic password
change
Users report to the helpdesk that icons usually seen on the menu bar are randomly appearing
on their compute screens. What could be a reason that computers are displaying these random
graphics? - correct answer ✔✔
What is reconnaissance? - correct answer ✔✔Active reconnaissance is a type of computer
attack in which an intruder engages with the targeted system to gather information about
vulnerabilities. The word reconnaissance is borrowed from its military use, where it refers to a
mission into enemy territory to obtain information.
What are three functions provided by the syslog service? - correct answer ✔✔
Which two options are security best practices the help mitigate BYOD risk? - correct answer ✔✔
, What is the first step the wireless client will do in order to communicate over the network using
a wireless management frame? - correct answer ✔✔
a utility does not automatically start whenever the computer is started. What can the technician
do to resolve this problem? - correct answer ✔✔
Which host based fire-wall uses a three-profile approach to configure the firewall functionality?
- correct answer ✔✔
Which component in linux is responsible for interacting directly with the device hardware? -
correct answer ✔✔
Which statement describe the cyber kill chain? - correct answer ✔✔It is a set of metrics
designed to create a way to describe security incidents in a structured and repeatable way
Which schema or model allows security professionals to enter data about a particular incident,
such as victim demographics, incident descriptions, discovery method and response, and impact
assessment, and share that data with the security community anonymously? - correct answer
✔✔
What is the responsibility of the IT support group when handling a security incident? - correct
answer ✔✔
Which value, that is contained in an IPV4 header field, is decremented by each router that
receives a packet? - correct answer ✔✔Time-to-live. When a router receives a packet, the
router will decrement the time-to-live field by one. When the field reaches zero, the receiving
router will discard the packet and will send an ICMP time exceeded message to the sender.
Whih statment describes the state of the adminsitrator and guest accounts after a user instal
windows desktop version to a new computer? - correct answer ✔✔By default both the