100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DCOM 258 - SECURITY + QUESTIONS & ANSWERS

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
28-07-2025
Written in
2024/2025

DCOM 258 - SECURITY + QUESTIONS & ANSWERS

Institution
DCOM 258
Course
DCOM 258

Content preview

DCOM 258 - SECURITY + QUESTIONS & ANSWERS
A system analyst is tasked with searching the dark web for harvested customer data.
Because these sites cannot be readily found in standard website searches, what is
often gained by "word of mouth" bulletin boards to assist in reaching the desired page? -
Answers - Dark Website URL - Access to deep websites are accessed via URL.

One aspect of threat modeling is to identify potential threat actors and the risks
associated with each one. When assessing the risk that any one type of threat actor
poses to an organization, what are the most critical factors to profile? (Select all that
apply.) - Answers - Intent, motivation

Which of the following are the best examples of an insider threat? (Select all that apply.)
- Answers - Former employee, contractor

A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequently visit. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - Answers - OSINT, Social engineering

A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - Answers
- Structured Threat Information eXpression (STIX)

Which situation would require keyboard encryption software to be installed on a
computer? - Answers - To protect against spyware

Analyze the following attacks to determine which best illustrates a pharming attack. -
Answers - A customer enters the correct URL address of their bank, which should point
to the IP address 172.1.24.4. However, the browser goes to 168.254.1.1, which is a
fake site designed to look exactly like the real bank site.

An employee calls IT personnel and states that they received an email with a PDF
document to review. After the PDF was opened, the system has not been performing
correctly. An IT admin conducted a scan and found a virus. Determine the two types of
viruses the computer most likely has. (Select all that apply.) - Answers - Macro, script

Which of the following utilizes both symmetric and asymmetric encryption? - Answers -
Digital Envelope - A type of key exchange system that utilizes symmetric encryption for
speed and asymmetric encryption for security.

Written for

Institution
DCOM 258
Course
DCOM 258

Document information

Uploaded on
July 28, 2025
Number of pages
4
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2019
Member since
4 year
Number of followers
1447
Documents
49160
Last sold
1 day ago

3.8

345 reviews

5
172
4
61
3
44
2
16
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions