ITN 262 MIDTERM EXAM QUESTIONS AND
ANSWERS 2025
An attempt by a threat agent to exploit assets without
permission is referred to as - ...ANSWER... ✔ ✔an
attack
This yields a more specific set of attacks tied to our
particular threat agents - ...ANSWER... ✔ ✔attack
matrix
CIA properties do not include - ...ANSWER... ✔
✔authentication
AUP stands for - ...ANSWER... ✔ ✔acceptable use
policy
Zero Day vulnerability is one that has been reported to
the software's vendor and the general public -
...ANSWER... ✔ ✔false
,2|Page
A person skilled in attacking computer systems, who uses
those skills as a security expert to help protect systems is
a - ...ANSWER... ✔ ✔white hat hacker
A security analyst is performing a security assessment,
the analyst should not - ...ANSWER... ✔ ✔take action
to mitigate a serious risk
victims can protect themselves against zero day attacks -
...ANSWER... ✔ ✔false
When you analyze a system using the six-phase security
process you are performing a - ...ANSWER... ✔
✔risk assessment
An attack in which someone tries to trick a system
administrator into divulging a password is called -
...ANSWER... ✔ ✔social engineering
authentication does what - ...ANSWER... ✔
✔associated and individual with and identity
,3|Page
An authentication system that requires the user to
provide two different passwords and a fingerprint scan
is an example of - ...ANSWER... ✔ ✔two-factor
authentication
there are three types of tokens they do not include -
...ANSWER... ✔ ✔offensive tokens
the most recent list hash algorithm is what - ...ANSWER...
✔ ✔SHA-512
The following are associated with a weak threat except
- ...ANSWER... ✔ ✔all are associated with weak
threats
Hashing - ...ANSWER... ✔ ✔transforms readable text
into gibberish
in a password system the total number of possible
passwords is - ...ANSWER... ✔ ✔search space
An attack the blocks access to a system by other users is
called - ...ANSWER... ✔ ✔denial of service
, 4|Page
something you know, something you have and something
you are....something you make is not - ...ANSWER... ✔
✔fundamental strategies for authenticating people
The type of cypher that rearranges the text of a
message is called a - ...ANSWER... ✔ ✔transposition
cipher
The Enigma was - ...ANSWER... ✔ ✔a rotor machine
File encryption on a computers hard drive involves what
risk - ...ANSWER... ✔ ✔all of the answers
Hiding an object, such as a diary to prevent other from
finding it is an example of - ...ANSWER... ✔
✔security through obscurity
Encryption protects information by presenting -
...ANSWER... ✔ ✔a key
AES was introduced in - ...ANSWER... ✔ ✔2002