100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
10-10-2024
Written in
2024/2025

ITN 260 EXAM QUESTIONS AND CORRECT ANSWERS (VERIFIED ANSWERS) GRADED A+ Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to Moa's inbox on Tuesday. How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. Which of these items retrieved through dumpster diving would NOT provide useful information? - Answer- books Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed? - Answer- impersonation Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? - Answer- blocking ransomware Which of the following is defined as following an authorized person through a secure door? - Answer- tailgating Which variation of a phishing attack sends phishing messages only to wealthy individuals? - Answer- Whaling Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed? - Answer- metamorphic A watering hole attack is directed against which of the following? - Answer- a smaller group of specific users What is a characteristic of the Trusted Platform Module (TPM)? - Answer- It provides cryptographic services in hardware instead of software

Show more Read less
Institution
ITN 260
Course
ITN 260









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 260
Course
ITN 260

Document information

Uploaded on
October 10, 2024
Number of pages
8
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 260 EXAM QUESTIONS AND
CORRECT ANSWERS (VERIFIED
ANSWERS) GRADED A+
Which of these could NOT be defined as a logic bomb? - Answer- Send spam email to
Moa's inbox on Tuesday.

How can an attacker use a hoax? - Answer- A hoax could convince a user that a bad
Trojan is circulating and that he should change his security settings.

Which of these items retrieved through dumpster diving would NOT provide useful
information? - Answer- books

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her
his password. What social engineering attack has Hedda performed? - Answer-
impersonation

Linnea's father called her to say that a message suddenly appeared on his screen that
says his software license has expired and he must immediately pay $500 to have it
renewed before control of the computer will be returned to him. What type of malware is
this? - Answer- blocking ransomware

Which of the following is defined as following an authorized person through a secure
door? - Answer- tailgating

Which variation of a phishing attack sends phishing messages only to wealthy
individuals? - Answer- Whaling

Which type of mutation completely changes a virus from its original form by rewriting its
own code whenever it is executed? - Answer- metamorphic

A watering hole attack is directed against which of the following? - Answer- a smaller
group of specific users

What is a characteristic of the Trusted Platform Module (TPM)? - Answer- It provides
cryptographic services in hardware instead of software

Which of these has an onboard key generator and key storage facility, as well as
accelerated symmetric and asymmetric encryption, and can back up sensitive material
in encrypted form? - Answer- Hardware Security Module (HSM)

, Illya was asked to recommend the most secure asymmetric cryptographic algorithm to
his supervisor. Which of the following did he choose? - Answer- SHA-2

Which of the following key exchanges uses the same keys each time? - Answer- Diffie-
Hellman (DH)

A(n) _____ is not decrypted but is only used for comparison purposes. - Answer- digest

Alyosha was explaining to a friend the importance of protecting a cryptographic key
from cryptoanalysis. He said that the key should not relate in a simple way to the cipher
text. Which protection is Alyosha describing? - Answer- confusion

What is the latest version of the Secure Hash Algorithm? - Answer- SHA-3

Egor wanted to use a digital signature. Which of the following benefits will the digital
signature not provide? - Answer- verify the receiver

The Hashed Message Authentication Code (HMAC) _____. - Answer- hashes the key
and the message

Proving that a user sent an email message is known as _____. - Answer- non-
repudiation

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet
was rotated 13 steps. What type of cipher is this? - Answer- ROT13

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
- Answer- plaintext

At a staff meeting one of the technicians suggested that the enterprise protect its new
web server by hiding it and not telling anyone where it is located. Iosif raised his hand
and said that security through obscurity was a poor idea. Why did he say that? -
Answer- It would be essentially impossible to keep its location a secret from everyone.

Which of these is NOT a basic security protection for information that cryptography can
provide? - Answer- risk loss

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his
coworker an example of adding two bits, 1 and 1. What is the result of this sum? -
Answer- 0

Which of these is the strongest symmetric cryptographic algorithm? - Answer-
Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic
algorithm, which key does he use to encrypt the message? - Answer- Alice's public key

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
777
Member since
3 year
Number of followers
475
Documents
14923
Last sold
4 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3.9

163 reviews

5
87
4
21
3
25
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions