100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 262 MIDTERM Questions with Detailed Verified Answers

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
25-07-2025
Written in
2024/2025

ITN 262 MIDTERM Questions with Detailed Verified Answers

Institution
ITN 262
Course
ITN 262










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 262
Course
ITN 262

Document information

Uploaded on
July 25, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1



ITN 262 MIDTERM Questions with
Detailed Verified Answers


Question: A security analyst is performing a security assessment. The analyst
should not:


Ans: take actions to mitigate a serious risk.


Question: Which of the following yields a more specific set of attacks tied to
our particular threat agents?


Ans: Attack matrix


Question: Which of the following produces a risk to an asset?


Ans: A threat agent and an attack the agent can perform


Question: Which of the following describes the effect of the Digital
Millennium Copyright Act (DMCA) on the investigation and publication of
security flaws in commercial equipment?


Ans: It restricts the publication of techniques to reverse-engineer copy
protection schemes.


Question: Which of the following most often forbids people from performing
trial-and-error attacks on computer systems?

, Page | 2

Ans: Acceptable use policies


Question: Section 1.6.2 outlines a procedure for disclosing security
vulnerabilities in a commercial device or product. Assume that we have
discovered a vulnerability in a commercial product. The vendor has not
acknowledged our initial vulnerability report or communicated with us in any
other way. They have not announced the vulnerability to the public. We wish
to warn the public of the vulnerability as soon as is ethically defensible. Given
the procedure in Section 1.6.2, which of the following is the best course of
action?


Ans: After 30 days, announce that the vulnerability exists, and describe
how to reduce a system's risk of attack through that vulnerability.


Question: Given the vulnerability disclosure procedure in Section 1.6.2 and
the story of Michael Lynn's presentation of a Cisco router vulnerability at Black
Hat 2005, which of the following most accurately describes Lynn's action?


Ans: Lynn acted ethically because the vulnerability had already been
reported and patched, and he did not describe how to exploit the
vulnerability.


Question: When disclosing a security vulnerability in a system or software, the
manufacturer should avoid:


Ans: including enough detail to allow an attacker to exploit the
vulnerability.

, Page | 3

Question: A risk assessment involves which of the following?


Ans: Identifying risks, Prioritizing Risks


Question: The character that separates directories in a Windows directory
path is:


Ans: the back slash (\).


Question: Bob has set up three user IDs on his computer. Match his login with
what happens when he creates a file.


Files belong to "Superbob"


Files belong to "Suitemates"


Files belong to "Bob"


Ans: Logged in as "Superbob"




Logged in as "Suitemates"




Logged in as " Bob "


Question: Two mechanisms to apply initial access rights are:

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Ivie Southern New Hampshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
18
Member since
7 months
Number of followers
1
Documents
7046
Last sold
5 days ago

3.3

6 reviews

5
2
4
1
3
1
2
1
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions