Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITSY 2341 EXAM 1 QUESTIONS AND ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
17-09-2025
Geschreven in
2025/2026

ITSY 2341 EXAM 1 QUESTIONS AND ANSWERS

Instelling
ITSY 2341
Vak
ITSY 2341

Voorbeeld van de inhoud

ITSY 2341 EXAM 1 QUESTIONS AND ANSWERS

Which type of attack involves sending a large number of connection or information
requests to a target? - Answer -Denial-of-service (DoS)

A malware program that hides its true nature and reveals its designed behavior only
when activated is called a ____________. - Answer -Trojan horse

When solving problems, what is the first step? - Answer -Recognize and define the
problem.

A long-term interruption in electrical power availability is known as a ____________. -
Answer -blackout

What function will an audit log provide when it is configured to track user activity on an
information system? - Answer -Accountability

An act where people enter real or virtual premises or systems they have not been
authorized to enter is called ____________. - Answer -trespass

A feature left behind by system designers or maintenance staff or that is placed by a
hacker once they have compromised a system to allow quick access to a system at a
later time by bypassing access controls is a ____________? - Answer -back door

The C.I.A. triad for computer security includes which of these characteristics? - Answer
-Availability

Which of the following functions of information security management seeks to dictate
certain behavior within the organization through a set of organizational guidelines? -
Answer -Policy

A type of attack where the adversary intercepts network packets, modifies them, and
inserts them back into the network is called a ____________. - Answer -man-in-the-
middle

The protection of voice and data components, connections, and content is known as
____________ security. - Answer -Network

An intentional or unintentional act that can damage or otherwise compromise
information and the systems that support it is known as a(n) ___________ - Answer -
attack

"4-1-9" fraud is an example of a ____________ attack. - Answer -social engineering

,Which of the 12 categories of Threats best describes a situation where the adversary
removes data from a victims computer? - Answer -theft

Blackmail threat of informational disclosure is an example of which threat category? -
Answer -Information extortion

Communications security involves the protection of which of the following? - Answer -
media, technology, and content

Technology services are usually arranged with an agreement defining minimum service
levels known as a(n) - Answer -SLA

A ____________ is an attack in which a coordinated stream of requests is launched
against a target from many locations at the same time. - Answer -DDOS

Which of the following is NOT an approach to password cracking?

a) ransomware
b) brute force
c) dictionary attacks
d) social engineering attacks - Answer -a) ransomware

Which of the following is not among the deadly sins of software security?

a) Extortion sins
b) Implementation sins
c) Web application sins
d) Networking sins - Answer -a) Extortion sins

Any event or circumstance that has the potential to adversely affect operations and
assets is known as a(n) ____________. - Answer -threat

An attack that uses Phishing techniques along with specialized forms of malware to
encrypt the victim's data files is known as ___________. - Answer -ransomware

Which function of Infosec management encompasses security personnel as well as
aspects of the SETA program? - Answer -People

A short term interruption in electrical power availability is known as a _____________. -
Answer -Fault

"4-1-9" fraud is one form of a(n) ___________ fraud. - Answer -advance fee

Which of the following is compensation for a wrong committed by an individual or
organization? - Answer -Restitution

, Which of the following is an international effort to reduce the impact of copyright,
trademark, and privacy infringement, especially via the removal of technological
copyright protection measures? - Answer -DMCA

What are three general categories of unethical behavior that organizations and society
should seek to eliminate. - Answer -Ignorance, Accident, and Intent

Which of the following is the best method for preventing an illegal or unethical activity?
Examples include laws, policies, and technical controls. - Answer -Deterrence

Any court can impose its authority over an individual or organization if it can establish
which of the following - Answer -Jurisdiction

Which law extends protection to intellectual property, which includes words published in
electronic formats? - Answer -U.S. Copyright Law

A law that addresses privacy and security concerns associated with the electronic
transmission of Personal Healthcare Information is the ____________? - Answer -
Health Information Technology for Economic and Clinical Health Act

Which law is a collection of statutes that regulates the interception of wire, electronic,
and oral communications? - Answer -The Electronic Communications Privacy Act of
1986

Which of the following ethical frameworks is the study of the choices that have been
made by individuals in the past, attempting to answer the question, what do others think
is right? - Answer -Descriptive ethics

Which of the following is the study of the rightness or wrongness of intentions and
motives as opposed to the rightness or wrongness of the consequences and is also
known as duty- or obligation-based ethics? - Answer -Deontological ethics

In digital forensics, all investigations follow the same basic methodology once
permission to search and seize is received, beginning with _______________. -
Answer -Identifying relevant items of evidentiary value.

Which of the following is NOT an origin used to categorize types of law?

a) constitutional
b) regulatory
c) statutory
d) international - Answer -d) international

Sworn testimony that certain facts are in the possession of the investigating officer and
that they warrant the examination of the specific items located at a specific place is
known as a(n) _____________. - Answer -affidavit

Geschreven voor

Instelling
ITSY 2341
Vak
ITSY 2341

Documentinformatie

Geüpload op
17 september 2025
Aantal pagina's
27
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GEEKA YALA UNIVERSITY
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2107
Lid sinds
4 jaar
Aantal volgers
1446
Documenten
54024
Laatst verkocht
11 uur geleden

3.8

358 beoordelingen

5
177
4
61
3
48
2
17
1
55

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen