100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

SECURITY+ DCOM 258 QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
28-07-2025
Written in
2024/2025

SECURITY+ DCOM 258 QUESTIONS & ANSWERS

Institution
DCOM 258
Course
DCOM 258

Content preview

SECURITY+ DCOM 258 QUESTIONS & ANSWERS
Encryption, authentication, and anti-malware are all ways to protect against malicious
threats. - Answers - True

An example of authorization with "something you are" would be? - Answers - Retina
Pattern

By an overwhelming percentage, most security / data breaches are caused by: -
Answers - Human Error/Negligence

All are types of physical security except: - Answers - Concrete Barriers

Which of the following does the "A" in "CIA" stand for when relating to IT security? -
Answers - Availability

Social engineering includes viruses, worms, and Trojan horses. - Answers - False

Which type of hacker has no affiliation with an organization yet will hack systems
without malicious intent, but yet may be doing something illegal? - Answers - Gray Hat

When a network security device experiences a system failure, it is best for it to default
to a "Fail / Open" state. - Answers - False

For information security, what is the I in CIA? - Answers - Integrity

Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
Answers - Nonrepudiation

Which of the following is the greatest risk for removable storage? - Answers -
Confidentiality of Data

In information security the three main goals are known as Confidentiality, Integrity, and
Availability. - Answers - True

Which is not a type of Social Engineering? - Answers - Trojan

Which of the following is an example of a personal software firewall? - Answers -
ZoneAlarm

Which of the following methods of malware delivery is used in computer programs to
bypass normal authentication? - Answers - Backdoor

One of the biggest problems with BYOD is - Answers - There is virtually no security
control over the sofware / hardware.

, Which of the following occurs when an IDS identifies legitimate activity as something
malicious? - Answers - False-Positive

Opening mail relays can decrease the amount of spam that an organization receives on
its e-mail server. - Answers - False

Which of the following is an example of whole disk encryption? - Answers - Bitlocker

A master computer controls a botnet. - Answers - True

Most antimalware / virus software is signature based. - Answers - True

A RAT is an example of a Trojan horse. - Answers - True

Malware is software designed to infiltrate a computer system without the users consent.
- Answers - True

Active interception is the act of exploiting a bug or design flaw in software. - Answers -
False

Viruses self-replicate whereas worms do not. - Answers - False

The love bug is an example of a rootkit. - Answers - False

Which command lists the hotfixes installed to Windows? - Answers - systeminfo

What is baselining? - Answers - The process of measuring changes in networking
devices, hardware, and software.

Of the following, which can be a security benefit when using virtualization? - Answers -
If a virtual machine is compromised, the adverse effects can be compartmentalized.

The second step in a patch management strategy is testing. - Answers - True

Which of the following should you implement to keep a well-maintained computer? -
Answers - Update the firewall.
Update the BIOS.
Use a surge protector.

Which of the following is the best file system to use in Windows? - Answers - NTFS

To open the Local Group Policy Editor console window, a user should type MMC in the
Run prompt. - Answers - False

The net stop commands disable services in Windows. - Answers - False

Written for

Institution
DCOM 258
Course
DCOM 258

Document information

Uploaded on
July 28, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2019
Member since
4 year
Number of followers
1447
Documents
49160
Last sold
1 day ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions