100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

ICS-171 Exam 1 (LCC) Questions With Verified And Accurate For Guaranteed Pass| Graded A+.

Puntuación
-
Vendido
-
Páginas
5
Grado
A+
Subido en
14-08-2025
Escrito en
2025/2026

After downloading a file from a website, you hash the file and compare the hash to the hash of the file posted on the website. What BEST describes the purpose of your actions? - correct answers To support integrity You need to send an email with a list of employee names and their social security numbers. What is the BEST choice to maintain confidentiality? - correct answers Encrypt the data A circumstance or event that could negatively impact confidentiality, integrity, or availability - correct answers threat This is NOT an example of non-repudiation. - correct answers hashing If a student graduates and does not sign up to take more classes, their email accounts are disabled. What security control is this an example of? - correct answers preventive control Which of the following commands does NOT show the network configuration of your computer? - correct answers tracert Most physical servers in an organization are currently underutilized. Management wants a better return on investment (ROI). What is a solution that will provide the best ROI? - correct answers Run many virtual servers on a few physical machines What are port numbers used for? - correct answers to identify a specific service on a computer What protocol is used to synchronize time on network devices? - correct answers NTP What is the BEST device to prevent PII data from being sent in an email to a person outside the organization? - correct answers mail gateway Which authentication service provides a SSO solution for different environments using a federated identity management system? - correct answers Shibboleth Which authentication service is NOT a SSO solution? - correct answers Kerberos What is stored in the /etc/passwd file in Linux? - correct answers information about user accounts on the system Steganography without encryption provides what goal? - correct answers obfuscation Russian hackers in Russia are sending messages from Russia to their collaborators in the USA. What is a security algorithm that they might be using for encrypting their messages? - correct answersRijndael-128, CBC The steghide command in Linux does what? - correct answers hides and encrypts one file inside a second file Instead of creating access control settings based on each student, the system administrator created a Student group that has the access control settings for a generic student. When students create an account online, their account is automatically updated with the same access control settings as the Student group. What type of access control is this? - correct answers RBAC You live on Oahu, but telecommute to an IT job in California for the higher salary. You are able to work at home; however, when you meet several of your Oahu co-workers at Starbucks to collaborate face-to-face, you and your co-workers are unable to connect to the company's network. What is the MOST likely reason that y'all cannot access the company's network? - correct answer location-based policy You are setting up an access control system that uses different security levels. For example, Top Secret Level, Secret Level, Confidential Level, and Official Use Level. What type of access control is this? - correct answers MAC You are setting up an access control system that considers the subject, object, action, and environment for authorization. For example, employees are only allowed to access the company printers when they are using a computer in the company's building during the work week during the hours of 9am to 5pm. What type of access control is this? - correct answers ABAC From a security perspective, what should be done with an employee's account when the employee leaves an organization? - correct answers disable the account What is Wireshark used for? - correct answers capturing and analyzing network traffic Which Linux command is used for capturing and analyzing network traffic? - correct answers tcpdump Which Linux command can be used for capturing HTTP traffic? - correct answers dumpcap What data is stored in an ARP table? - correct answers IP addresses and MAC addresses Which protocol uses TCP port 23? - correct answers Telnet Which protocol uses TCP port 22? - correct answers SSH Which application do we use capture and view network traffic? - correct answers Wireshark When we connect with another computer using SSH, the data sent over the network is _____. - correct answers encrypted Which protocol is used for connection oriented traffic over the network? - correct answers TCP _____ is an attack where the data in the cache is modified by the attackers. - correct answers poisoning attack ARP matches _____ addresses to _____ addresses. - correct answersIPv4, MAC What does an attacker need for a successful sniffing attack? - correct answers a protocol analyzer and cleartext traffic Which protocol is used for connectionless traffic over the network? - correct answers UDP What port number is used for SSH? - correct answers22 What protocol is a secure way to log in from your laptop to a remote server? - correct answers SSH What folder on UHUNIX is used to store web pages? - correct answers public _html Your organization requires that all employee data sent over the network be encrypted. Which of the following protocols would NOT meet this requirement? - correct answers FTP Which of the following protocols does NOT use TCP port 22? - correct answers FTP You are enabling SSH on some servers and all workstations on the organization's network. Which of the following use cases are you MOST likely supporting with this action? - correct answers Encrypt data traveling across the network You want to support the CIA triad for voice and video transmissions. What protocol will you enable on all workstations on the organization's network? - correct answers SRTP You are enabling RTP on all workstations on the organization's network. Which of the following use cases are you MOST likely supporting with this action? - correct answers Support voice and video transmission

Mostrar más Leer menos
Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Grado

Información del documento

Subido en
14 de agosto de 2025
Número de páginas
5
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ICS-171 Exam 1 (LCC)

After downloading a file from a website, you hash the file and compare the hash to the hash of the file
posted on the website. What BEST describes the purpose of your actions? - correct answers To support
integrity



You need to send an email with a list of employee names and their social security numbers. What is the
BEST choice to maintain confidentiality? - correct answers Encrypt the data



A circumstance or event that could negatively impact confidentiality, integrity, or availability - correct
answers threat



This is NOT an example of non-repudiation. - correct answers hashing



If a student graduates and does not sign up to take more classes, their email accounts are disabled.
What security control is this an example of? - correct answers preventive control



Which of the following commands does NOT show the network configuration of your computer? -
correct answers tracert



Most physical servers in an organization are currently underutilized. Management wants a better return
on investment (ROI). What is a solution that will provide the best ROI? - correct answers Run many
virtual servers on a few physical machines



What are port numbers used for? - correct answers to identify a specific service on a computer



What protocol is used to synchronize time on network devices? - correct answers NTP



What is the BEST device to prevent PII data from being sent in an email to a person outside the
organization? - correct answers mail gateway

, Which authentication service provides a SSO solution for different environments using a federated
identity management system? - correct answers Shibboleth



Which authentication service is NOT a SSO solution? - correct answers Kerberos



What is stored in the /etc/passwd file in Linux? - correct answers information about user accounts on
the system



Steganography without encryption provides what goal? - correct answers obfuscation



Russian hackers in Russia are sending messages from Russia to their collaborators in the USA. What is a
security algorithm that they might be using for encrypting their messages? - correct answersRijndael-
128, CBC



The steghide command in Linux does what? - correct answers hides and encrypts one file inside a
second file



Instead of creating access control settings based on each student, the system administrator created a
Student group that has the access control settings for a generic student. When students create an
account online, their account is automatically updated with the same access control settings as the
Student group. What type of access control is this? - correct answers RBAC



You live on Oahu, but telecommute to an IT job in California for the higher salary. You are able to work
at home; however, when you meet several of your Oahu co-workers at Starbucks to collaborate face-to-
face, you and your co-workers are unable to connect to the company's network. What is the MOST likely
reason that y'all cannot access the company's network? - correct answer location-based policy



You are setting up an access control system that uses different security levels. For example, Top Secret
Level, Secret Level, Confidential Level, and Official Use Level. What type of access control is this? -
correct answers MAC



You are setting up an access control system that considers the subject, object, action, and environment
for authorization. For example, employees are only allowed to access the company printers when they
$15.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
RealGrades Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
170
Miembro desde
2 año
Número de seguidores
52
Documentos
11665
Última venta
3 semanas hace

4.0

26 reseñas

5
12
4
5
3
7
2
1
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes