Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIT 184 FINAL EXAM QUESTIONS AND ANSWERS TESTED AND APPROVED NEW MODIFIED EXAM

Beoordeling
-
Verkocht
-
Pagina's
20
Cijfer
A+
Geüpload op
29-09-2025
Geschreven in
2025/2026

CIT 184 FINAL EXAM QUESTIONS AND ANSWERS TESTED AND APPROVED NEW MODIFIED EXAM

Instelling
Vak

Voorbeeld van de inhoud

CIT 184 FINAL EXAM QUESTIONS AND
ANSWERS TESTED AND APPROVED NEW
MODIFIED EXAM


A structure that replaces a normal single door with a phone booth-
sized space with a door on each side is called a ________. --
CORRECT ANSWER--mantrap



Greg is educating users about social media concerns in the corporate
setting. Which of the following risks is most likely associated with an
employee who has recently been terminated? --CORRECT
ANSWER--Tweet rage



Barry is investigating the unauthorized access to his chief executive
officer's (CEO's) email account. Barry discovers the tools Ettercap
and Hunt on a nearby workstation. Which of the following attacks is
the most likely cause of the breach? --CORRECT ANSWER--Session
hijacking



Which type of token does NOT require that the card be inserted or
slid through a reader? --CORRECT ANSWER--Contactless



Page 1 of 20

,The act of a third party covertly monitoring Internet and telephone
conversations is called ________. --CORRECT ANSWER--
wiretapping




Consumption of bandwidth, consumption of resources, and
exploitation of programming defects are the three broad categories of
________. --CORRECT ANSWER--denial of service (DoS) attacks



From a security standpoint, which of the following is NOT desirable
in a door? --CORRECT ANSWER--Hollow core



Lin is designing the locks for a sensitive data center facility. She
would like to choose the strongest possible lock that is appropriate for
use in a commercial facility. What type of lock should she choose? --
CORRECT ANSWER--Grade 1



A device used to break a network into multiple logical network
segments known as collision domains is called a ________. --
CORRECT ANSWER--switch




Page 2 of 20

, Active@ and Trinity Rescue Kit are examples of ________. --
CORRECT ANSWER--tools used to change passwords



Attackers' attempts to stop their attacks from being detected are
referred to as ________. --CORRECT ANSWER--covering tracks



________ is designed to convert fully qualified domain names
(FQDNs) into numeric Internet Protocol (IP) addresses or IP
addresses into FQDNs. --CORRECT ANSWER--Domain Name
System (DNS)



Which of the following is NOT a step in the common lock picking
method of scraping? --CORRECT ANSWER--A pry bar is used to
pry the lock away from the door.



Which of the following statements is NOT true regarding Address
Resolution Protocol (ARP) poisoning? --CORRECT ANSWER--It
cannot be used to tap Voice over IP (VoIP) phone calls.



A mechanical or electronic device designed to secure, hold, or close
items operated by a key, combination, or keycard is a ________. --
CORRECT ANSWER--lock

Page 3 of 20

Geschreven voor

Vak

Documentinformatie

Geüpload op
29 september 2025
Aantal pagina's
20
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$26.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
TESTBANKNURSEHUB
4.0
(2)

Maak kennis met de verkoper

Seller avatar
TESTBANKNURSEHUB Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
8
Lid sinds
8 maanden
Aantal volgers
0
Documenten
3097
Laatst verkocht
2 weken geleden
your document plug

I offer all types of documents notes, exams and study guide practice exams. Feel free to contact me for any clarification and document prices.

4.0

2 beoordelingen

5
0
4
2
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen