Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)

Beoordeling
-
Verkocht
-
Pagina's
16
Cijfer
A+
Geüpload op
13-03-2026
Geschreven in
2025/2026

ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+)ITN 263 FINAL EXAM|| 246 QUESTIONS AND ANSWERS (GRADED A+) Which of the following is not a primary objective of information security? - ANSWER-Privacy A security assessment may include which of the following steps? - ANSWER-All of the above Security ________ are goals an organization strives to achieve through its security efforts. - ANSWER-Objectives Assigning users, including administrators, only the necessary privileges, access, and permissions to accomplish their assigned work is an example of __________. - ANSWER-the principle of least privilege

Meer zien Lees minder
Instelling
ITN 263
Vak
ITN 263

Voorbeeld van de inhoud

ITN 263 FINAL EXAM|| 246
QUESTIONS AND ANSWERS
(GRADED A+)
Which of the following is not a primary objective of information security? - ANSWER-
Privacy

A security assessment may include which of the following steps? - ANSWER-All of
the above

Security ________ are goals an organization strives to achieve through its security
efforts. - ANSWER-Objectives

Assigning users, including administrators, only the necessary privileges, access, and
permissions to accomplish their assigned work is an example of __________. -
ANSWER-the principle of least privilege

Which of the following is not a distinguishing characteristic of a WAN compared to a
LAN? - ANSWER-Has a limited geographic area

Isolating and compartmentalizing administrative privileges, so that no single
administrator has full or total power over the entire environment, is an example of
__________. - ANSWER-separation of duties

From the perspective of computers and networks, _________ is confidence that
other users will act in accordance with your organizations - ANSWER-Trust

One of the most effective preventative techniques in network security
troubleshooting is __________. - ANSWER-installing patches and updates

Which of the following has the ultimate and final responsibility for network security in
an organization? - ANSWER-Senior management

What is a potential disadvantage of online data backups? - ANSWER-Dependency
on provider's security

What does a client/server environment have that a peer-to-peer networking
environment typically does not? - ANSWER-Server

What is another form of a honeypot? - ANSWER-Padded cell

What is not an example of containment during incident response? - ANSWER-
Confirming a breach

Which of the following do you not get with network address translation (NAT)? -
ANSWER-A static public IP address for each internal client

,Which of the following enables you to check a client computer for compliance with
security policies and either grant or deny its access to the internal network? -
ANSWER-Network access control

What is the purpose of the post-mortem review after a security assessment? -
ANSWER-Learn from mistakes.

Which IT domain includes demilitarized zones (DMZs) and intrusion detection
systems (IDS)? - ANSWER-LAN-to-WAN Domain

Which of the following could compromise network security? - ANSWER-Simplify by
assigning maximum required permissions

Which IT domain in a typical IT infrastructure typically includes routers, circuits,
switches, firewalls, and equivalent gear at remote locations? - ANSWER-WAN
Domain

Which of the following is not a network security management best practice? -
ANSWER-Implement single-factor authentication

The lack of ____________ is both a strength and weakness of workgroups. -
ANSWER-Central authority

Which of the following is not true of compliance auditing? - ANSWER-A regular
compliance audit can be used in place of an organization's security policy.

You are filtering MAC addresses on a switch by blocking only specific IP addresses.
What do you use to perform this type of filtering? - ANSWER-Black list

Which of the following must an administrator organize to ensure follow-through of a
new security plan? - ANSWER-End-user training and awareness

You can filter which type of traffic on a typical firewall? - ANSWER-Both ingress and
egress

Which type of backup solution typically stores your data on another organization's
hardware, making you dependent on their security, confidentiality assurance, and
reliability? - ANSWER-Cloud

Who performs penetration testing? - ANSWER-Ethical hackers

Which private address range is 172.16.0.0-172.31.255.255 /12? - ANSWER-Class B

A _________ is a boundary network that hosts resource servers for the public
Internet. - ANSWER-DMZ

Window locks, door locks, and security cameras are examples of which of the
following? - ANSWER-Physical security

, A ___________ is either a hardware device or a software product you deploy to
enforce the access control policy on network communications. - ANSWER-Firewall

An IDS or IPS that uses a database of signatures or patterns of known malicious
activities to detect threats is called _______________ detection. - ANSWER--
knowledge-based

_______ resolves FQDNs into the associated IP address. [hint 3 letters abbreviation]
- ANSWER-DNS

Deciding which firewall rules to define is subject to an organization's
_____________. - ANSWER-- security policy

_______________ is the process of securing or locking down a host against threats
and attacks. - ANSWER-Hardening

In which situation is a change control system most effective? - ANSWER--
Troubleshooting

_____ ________ __________are new and previously unknown attacks for which no
current specific defenses exist. [hint 3 words] - ANSWER-Zero day exploits

Regarding firewall rules, what is another name for default deny? - ANSWER-- Deny
all

______ __________ ____________ allows an attacker to eavesdrop on electronic
devices from a distance. The technique is to perfect or simple to perform, but has
been demonstrated on LCD and CRT monitors as well as keyboard cables. With
minor shielding, you can eliminate most of the risk from such an attack. - ANSWER-
Van Eck phreaking

What is an access control list (ACL)? - ANSWER-- A firewall rule or filter

Which layer of the OSI reference model handles logical addressing (IP addresses)
and routing traffic? - ANSWER-Network

What is an important thing to do regarding firewall logs? - ANSWER-- Review the log
files frequently.

Which of the following a problem for static filtering? - ANSWER-Large, unordered
rule sets

What is one of the most problematic issues with an intrusion detection system (IDS)?
- ANSWER-- False negatives

What is a network component that filters traffic between nodes? - ANSWER-Firewall

What is the primary purpose of log monitoring? - ANSWER-- Detect malicious
network activities

Geschreven voor

Instelling
ITN 263
Vak
ITN 263

Documentinformatie

Geüpload op
13 maart 2026
Aantal pagina's
16
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€14,19
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NursingTutor1 West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
1683
Lid sinds
3 jaar
Aantal volgers
1074
Documenten
18398
Laatst verkocht
3 dagen geleden
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3,9

458 beoordelingen

5
216
4
79
3
92
2
21
1
50

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen