100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 263 Final Exam Review Questions & Answers 2024/2025

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
11-11-2024
Written in
2024/2025

ITN 263 Final Exam Review Questions & Answers 2024/2025 Which of the following characteristics relates to access control? - ANSWERSThe process or mechanism of granting or denying use of resources; typically applied to users or generic network traffic Which term describes an object, computer, program, piece of data, or other logical or physical component you use in a business process to accomplish a business task? - ANSWERSAsset When conducting an audit, the auditor should be which of the following? - ANSWERSAn external person who is independent of the organization under audit Which of the following describes authentication? - ANSWERSThe process of confirming the identity of a user Which term describes when a system is usable for its intended purpose? - ANSWERSAvailability Which of the following is the name given to unauthorized access to a system? - ANSWERSBackdoor Which of the following is a malicious software program distributed by a hacker to take control of a victim's computers? - ANSWERSAgent Which term describes the calculation of the total loss potential across a year for a given asset and a specific threat? - ANSWERSAnnualized Loss Expectancy (ALE) Which of the following refers to a form of encryption also known as point to point or host to host encryption? - ANSWERSTransport Mode Encryption

Show more Read less
Institution
ITN 263
Course
ITN 263









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 263
Course
ITN 263

Document information

Uploaded on
November 11, 2024
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 263 Final Exam Review Questions &
Answers 2024/2025

Which of the following characteristics relates to access control? - ANSWERSThe process or mechanism of
granting or denying use of resources; typically applied to users or generic network traffic



Which term describes an object, computer, program, piece of data, or other logical or physical
component you use in a business process to accomplish a business task? - ANSWERSAsset



When conducting an audit, the auditor should be which of the following? - ANSWERSAn external person
who is independent of the organization under audit



Which of the following describes authentication? - ANSWERSThe process of confirming the identity of a
user



Which term describes when a system is usable for its intended purpose? - ANSWERSAvailability



Which of the following is the name given to unauthorized access to a system? - ANSWERSBackdoor



Which of the following is a malicious software program distributed by a hacker to take control of a
victim's computers? - ANSWERSAgent



Which term describes the calculation of the total loss potential across a year for a given asset and a
specific threat? - ANSWERSAnnualized Loss Expectancy (ALE)



Which of the following refers to a form of encryption also known as point to point or host to host

encryption? - ANSWERSTransport Mode Encryption

, Which name is given to a probability prediction based on statistics and historical occurrences on the
likelihood of how many times in the next year a threat is going to cause harm? - ANSWERSAnnualized
Rate of Occurrence (ARO)



Which of the following describes an appliance firewall? - ANSWERSA Hardened Hardware Firewall



Which of the following characteristics describes the application layer? - ANSWERSThe top or seventh
layer of the OSI model, which is responsible for enabling communications with host software, including
the operating system



Which of the following is a malicious remote control tool? - ANSWERSNetBus



Which of the following creates TCP and UDP network connections to or from any port? -
ANSWERSNetCat



Which of the following uses ICMP as a tunneling protocol? - ANSWERSLoki



There are six steps for writing a security incident response plane. Which of the following is not a step? -
ANSWERSReport



Which of the following describes the principle that for an organization's security policy to be effective,
everyone must be forced to work within it and follow its rules? - ANSWERSUniversal Participation



Which of the following describes Security Stance? - ANSWERSAn organization's filtering configuration; it
answers the question, "What should be allowed and what should be blocked?"



Which of the following provides faster access to static content for external users accessing internal Web
servers? - ANSWERSReverse Caching



Which of the following refers to an operating system built exclusively to run on a bastion host device? -
ANSWERSProprietary OS

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bensuda Oxford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
834
Member since
3 year
Number of followers
445
Documents
20836
Last sold
1 day ago
ECONOMICS,NURSING,BIOLOGY AND ALL REVISION MATERIALS

DEDICATED TO PROVIDE YOU WITH THE BEST LEARNING MATERIALS THAT WILL IMPROVE YOUR GRADES ,WELCOME TO ALIZGRADES AND LETS DO IT TOGETHER!!! GOODLUCK!!!!!!!

3.7

156 reviews

5
72
4
24
3
25
2
11
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions