100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

NETSEC Exam 1 Questions and Answers| 100% Solved

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
11-02-2025
Written in
2024/2025

NETSEC Exam 1 Questions and Answers| 100% Solved

Institution
NETSEC
Course
NETSEC










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
NETSEC
Course
NETSEC

Document information

Uploaded on
February 11, 2025
Number of pages
27
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NETSEC Exam 1 Questions and Answers| 100%
Solved

4) If an attacker breaks into a corporate database and deletes critical files, this is a attack against
the ________ security goal.

A) integrity

B) confidentiality

C) Both A and B

D) Neither A nor B A



6) When a threat succeeds in causing harm to a business, this is called a ________.

A) breach

B) compromise

C) incident

D) All of the above D



9) Which of the following is a type of countermeasure?

A) Detective

B) Corrective

C) Both A and B

D) Neither A nor B C




12) Detective countermeasures keep attacks from succeeding. FALSE

,32) When considering penalties for hacking, motivation is irrelevant. TRUE




35) The terms "intellectual property" and "trade secret" are synonymous. FALSE



41) ________ are programs that attach themselves to legitimate programs.

A) Viruses

B) Worms

C) Both A and B

D) Neither A nor B A



52) Rootkits replace legitimate programs and are considered a deeper threat than a set of
programs called Trojan horses. FALSE



53) Which type of program can hide itself from normal inspection and detection?

A) Trojan horse

B) Stealth Trojan

C) Spyware

D) Rootkit D



54) Mobile code usually is delivered through ________.

A) webpages

, B) e-mail

C) directly propagating worms

D) All of the above A



65) In response to a chain of attack, victims can often trace the attack back to the final attack
computer. TRUE




68) Attackers cannot use IP address spoofing in port scanning attack packets. TRUE



69) The primary purpose for attackers to send port scanning probes to hosts is to identify which
ports are open. FALSE



70) To obtain IP addresses through reconnaissance, an attacker can use ________.

A) IP address spoofing

B) a chain of attack computers

C) Both A and B

D) Neither A nor B B



81) One of the two characterizations of expert hackers is ________.

A) automated attack tools

B) dogged persistence

C) Both A and B

D) Neither A nor B B

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
StudyLoom01 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
118
Member since
2 year
Number of followers
35
Documents
6930
Last sold
1 week ago
MINDSPIRE

FIND ALL EXAMS,STUDY GUIDES AND TEST BANKS, REVISION MATERIALS TO BOOST YOUR CAREER!! WELCOME (STUVIA 2025) Leave A review Once Purchased Documents has helped you So that other customers May be Satisfied. Also, Refer 2 colleagues and get One document Free. All the best in your Career. GOODLUCK!!! Thank you!

4.1

30 reviews

5
19
4
1
3
6
2
1
1
3

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions