100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 262 MIDTERM REVIEW QUESTIONS WITH ALL CORRECT ANSWERS

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
18-07-2025
Written in
2024/2025

ITN 262 MIDTERM REVIEW QUESTIONS WITH ALL CORRECT ANSWERS

Institution
ITN 262
Course
ITN 262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 262
Course
ITN 262

Document information

Uploaded on
July 18, 2025
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 262 MIDTERM REVIEW
QUESTIONS WITH ALL CORRECT
ANSWERS

An authentication system that requires the user to provide two different passwords and
a fingerprint scan is an example of: - Answer-two-factor authentication

Hashing: - Answer-transforms readable text into gibberish

An attack that blocks access to a system by other users is called: - Answer-denial of
service

An attack in which someone tries to trick a system administrator into divulging a
password is called: - Answer-social engineering

In a password system, the total number of possible passwords is called the: - Answer-
search space

Authentication does what: - Answer-Associates an individual with an identity

The most recent listed hash algorithm is what? - Answer-SHA-512

There are three types of tokens; they do not include which?

A. One-time password tokens

B. Challenge-response tokens

C. Passive tokens

D. Offensive tokens - Answer-D. Offensive tokens

The following risks are associated with a weak threat except.

A. Simple trial and error password guessing

B. All are risks associated with a weak threat

C. Shoulder surfing

, D. Searching for a written password - Answer-B. All are risks associated with a weak
threat

Hiding an object, such as a diary, to prevent others from finding it is an example of: -
Answer-Security through Obscurity

An algorithm is a type of ______________________. - Answer-procedure

An encryption algorithm that uses the same key for both encryption and decryption is: -
Answer-symmetric

To use symmetric cryptography, the sender and receiver must share: - Answer-a secret
key

The type of cipher that rearranges the text of a message is called: - Answer-
transposition

The Enigma was: - Answer-a rotor machine

Gilbert Vernam's bit combination operation for encrypting digital teletype transfer is now
referred as_______________________________. - Answer-XOR (Exclusive Or)

Which cipher replaces A with D and B with E? - Answer-Caesar Cipher

File encryption on the computer's hard drive involves what risk?

A. All of the Answers

B. Access by a Trojan Horse

C. Acess to low-level data written to the hard drive

D. Access by a separately booted OS - Answer-A. All of the Answers

Moore's Law observed that computing power for doubled every; - Answer-18 Months

Encryption protects information by presenting a - Answer-Key

AES was introduced in what year? - Answer-2002

When we share a key with two or more people we refer to that group as being the
____________. - Answer-Cryptonet

The following are common ways to handle new encryption keys except: - Answer-
transfer them via instant messenger

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
victoryguide stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
22
Member since
1 year
Number of followers
1
Documents
2782
Last sold
1 week ago

3.7

7 reviews

5
4
4
0
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions