100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Itn 262 Midterm study Questions and Answers (Expert Solutions)

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
29-07-2025
Written in
2024/2025

Itn 262 Midterm study Questions and Answers (Expert Solutions)

Institution
Itn 262
Course
Itn 262









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Itn 262
Course
Itn 262

Document information

Uploaded on
July 29, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page | 1



Itn 262 Midterm study Questions and
Answers (Expert Solutions)


Q: Supervisory control and data acquisition (SCADA) devices are most often associated
with: ANS 🗹🗹: utilities


Q: What is a worm? ANS 🗹🗹: Malware

Q: True or False? Botnets can (often) perform distributed denial of service (DDoS) attacks
in which thousands of individual computers send overwhelming amounts of traffic at a
victim's computer.

Correct! ANS 🗹🗹: True


Q: Desktop malware may not represent a direct threat to ________- or PLC-based
equipment, but practical attacks exist on these systems. ANS 🗹🗹: SCADA

Q: True or False? In requirement-based security, we identify and prioritize our security
needs in a risk assessment process.

Correct! ANS 🗹🗹: True


Q: Car ignition locks are an example of what type of decision? ANS 🗹🗹: Rule-based


Q: Both forms of the RMF illustrate a(n) _______ engineering process as a way to plan,
design, and build a complicated system. ANS 🗹🗹: systems


Q: True or False? The security process and the Information engineering process find
their origin in the concept of Continuous Improvement. ANS 🗹🗹: False

, Page | 2

Q: True or False? A supervisory control and data acquisition (SCADA) device is a
computer that controls motors, valves, and other devices in industrial applications. ANS
🗹🗹: True


Q: A security decision, such as locking your vehicle when not in use, is an example of:
ANS 🗹🗹: rule-based security.


Q: Which of the following is an example of a rule-based security decision? ANS 🗹🗹:
Locking a car's ignition


Q: Which of the following is an example of security theater? ANS 🗹🗹: Installing a fake
video camera

Q: True or False? The term "security theater" refers to security measures intended to
make potential victims feel safe and secure without regard to their effectiveness.

Correct! ANS 🗹🗹: True


Q: Risk Management Framework is a way to assess _______________ risks when developing
large-scale computer systems. ANS 🗹🗹: cybersecurity


Q: True or False? Security Category RMF begins with a high-level estimate of the impact
caused by cyber security failures. ANS 🗹🗹: True


Q: True or False? A vulnerability is a weakness in the boundary that protects the assets
from the threat agents. ANS 🗹🗹: True


Q: True or False? A threat agent is a person who did attack our assets, while an attacker
might attack an asset. ANS 🗹🗹: False


Q: Which of the following is a person who has learned specific attacks on computer
systems and can use those specific attacks? ANS 🗹🗹: Cracker


Q: CIA properties do not include: ANS 🗹🗹: authentication.
$13.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
StudyRM

Get to know the seller

Seller avatar
StudyRM University Of California - Los Angeles (UCLA)
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
5 months
Number of followers
0
Documents
4028
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions