100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

IT Security Defense against the digital dark arts Questions and Answers 100- Pass

Rating
-
Sold
-
Pages
54
Grade
A+
Uploaded on
24-07-2025
Written in
2024/2025

IT Security Defense against the digital dark arts Questions and Answers 100- Pass

Institution
APN - Advanced Practice Nurse
Module
APN - Advanced Practice Nurse











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
APN - Advanced Practice Nurse
Module
APN - Advanced Practice Nurse

Document information

Uploaded on
July 24, 2025
Number of pages
54
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

IT Security: Defense against the digital
dark arts Questions and Answers
100% Pass
Phishing, baiting, and tailgating are examples of attacks.
Malware
Password
Social engineering
Network ✔✔Social engineering


An attacker could redirect your browser to a fake website login page using what kind of attack?
Injection attack
DNS cache poisoning attack
DDoS attack
SYN flood attack ✔✔DNS cache poisoning attack


A(n) attack is meant to prevent legitimate traffic from reaching a
service. Injection
Password
Denial of Service
DNS Cache poisoning ✔✔Denial of Service


The best defense against password attacks is using strong .
Firewall configs
Passwords
Encryption
Antimalware software ✔✔Passwords

,Which of these is an example of the confidentiality principle that can help keep your data hidden
from unwanted eyes?
Preventing data loss
Making sure the data hasn't been tampered with
Preventing an unwanted download
Protecting online accounts with password protection ✔✔Protecting online accounts with password
protection


Which of these is true of vulnerabilities? Check all that apply.
A vulnerability is a flaw in the code of an application that can be exploited.
An exploit is the possibility of taking advantage of a vulnerability bug in
code. A vulnerability is the possibility of suffering a loss in the event of an
attack.
An exploit takes advantage of bugs and vulnerabilities. ✔✔A vulnerability is a flaw in the code
of an application that can be exploited.
An exploit takes advantage of bugs and vulnerabilities.


Which of these is true of blackhat and whitehat hackers?
Blackhats are malicious. Whitehats exploit weakness to help mitigate threats.
Blackhats work with owners to fix problems. Whitehats are just trying to get into a system.
Blackhats try to find weaknesses, but whitehats don't.
Blackhats and whitehats shouldn't be trusted. ✔✔Blackhats are malicious. Whitehats exploit
weakness to help mitigate threats.


A hacker infected your computer to steal your Internet connection and used your machine's
resources to mine Bitcoin. What is the name of this kind of attack?
Ransomware
Adware
Spyware
A bot ✔✔A bot

,A hacker stood outside a building and spun up a wireless network without anyone's knowledge.
At that point, the hacker was able to gain unauthorized access to a secure corporate network.
Which of these is the name of this type of attack?
A DNS Cache Poisoning attack
A Denial-of-Service (DoS) attack
A Rogue AP (Access Point) attack
SYN flood attack ✔✔A Rogue AP (Access Point) attack


What can occur during a ping of death (POD) attack? Check all that
apply. A Denial-of-Service (DoS)
A buffer overflow
Baiting
Remote code execution ✔✔A Denial-of-Service (DoS)
A buffer overflow
Remote code execution


How can injection attacks be prevented? Check all that apply.
Input validation
Flood guards
Log analysis systems
Data sanitization ✔✔Input validation
Data sanitization


Which of these is a way to help prevent brute-force attacks? Check all that apply.
Strong passwords
Password crackers
Captchas
Using a precompiled list of common passwords ✔✔Strong passwords
Captchas

, An end-user received an email stating his bank account was compromised, and that he needs to
click a link to reset his password. When the user visited the site, he recognized it as legitimate
and entered his credentials which were captured by a hacker. What type of social engineering
attack does this describe?
A baiting attack
A phishing
attack
A SQL injection attack
A tailgating attack ✔✔A phishing attack


When cleaning up a system after a compromise, you should look closely for any that may
have been installed by the attacker.
Backdoors
Poisoned DNS caches
Injection attacks
Rogue APs ✔✔Backdoors


The best defense against injection attacks is to .
Use antimalware software
Use input validation
Use strong passwords
Use a firewall ✔✔Use input validation


Which of these is an example of the integrity principle that can ensure your data is accurate and
untampered with?
Keeping a symmetric key secret
Using MACs (Message Authentication Codes)
Implementing flood guards
Using Encapsulating Security Payload ✔✔Using MACs (Message Authentication Codes)
Using Encapsulating Security Payload


What's the difference between a virus and a worm?
$17.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
frinyoo

Get to know the seller

Seller avatar
frinyoo Calfornia Southern Law School
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
2 year
Number of followers
0
Documents
809
Last sold
6 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions