ITN 262 MIDTERM EXAM 2025/2026 ACTUAL EXAM
QUESTIONS AND CORRECT ANSWERS (100%
VERIFIED) RATED A+.
Supervisory control and data acquisition (SCADA) devices are most often associated with:
b) utilities.
c) business offices.
d) universities.
a) retail stores. - CORRECT b) utilities.
What is a worm?
c) Blocks flow of computer traffic
b) Sends spam
a) Malware
d) Denial of service - CORRECT a) Malware
True or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which
thousands of individual computers send overwhelming amounts of traffic at a victim's computer.
True
False - CORRECT True
Desktop malware may not represent a direct threat to ________- or PLC-based equipment, but practical
attacks exist on these systems.
a) DOS
d) SCADA
c) PLC
b) FRA - CORRECT d) SCADA
True or False? In requirement-based security, we identify and prioritize our security needs in a risk
assessment process.
True
False - CORRECT True
, Page |2
Car ignition locks are an example of what type of decision?
b) Relativistic-based
c) Rule-based
d) Hunter's dilemma
a) Requirement-based - CORRECT c) Rule-based
Both forms of the RMF illustrate a(n) _______ engineering process as a way to plan, design, and build a
complicated system.
a) computer
d) information
b) security
c) systems - CORRECT c) systems
True or False? The security process and the Information engineering process find their origin in the
concept of Continuous Improvement.
True
False - CORRECT False
True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls
motors, valves, and other devices in industrial applications.
True
False - CORRECT True
A security decision, such as locking your vehicle when not in use, is an example of:
b) the hunter's dilemma.
d) None of these is correct.
c) integrity.
a) rule-based security. - CORRECT a) rule-based security.
Which of the following is an example of a rule-based security decision?
d) Trying to outdo a neighbor's security measures
b) Performing a step-by-step security analysis
c) Applying "security theater"
, Page |3
a) Locking a car's ignition - CORRECT a) Locking a car's ignition
Which of the following is an example of security theater?
c) Trying to outrun a hungry bear
a) Locking a car's ignition
b) Installing a fake video camera
d) Choosing a defense based on a systematic, step-by-step process - CORRECT b) Installing a fake video
camera
True or False? The term "security theater" refers to security measures intended to make potential victims
feel safe and secure without regard to their effectiveness.
True
False - CORRECT True
Risk Management Framework is a way to assess _______________ risks when developing large-scale
computer systems. - CORRECT cybersecurity
True or False? Security Category RMF begins with a high-level estimate of the impact caused by cyber
security failures.
True
False - CORRECT True
True or False?
A vulnerability is a weakness in the boundary that protects the assets from the threat agents.
True
False - CORRECT True
True or False? A threat agent is a person who did attack our assets, while an attacker might attack an
asset.
True
False - CORRECT False
Which of the following is a person who has learned specific attacks on computer systems and can use
those specific attacks?
d) Hacker
a) Cracker
, Page |4
b) Script kiddy
c) Phone phreak - CORRECT a) Cracker
CIA properties do not include:
d) availability.
a) confidentiality.
c) authentication.
b) integrity. - CORRECT c) authentication.
Which of the following are the CIA properties?
d) Availability
f) Implementation
c) Integrity
a) Authentication
b) Confidentiality
e) Identity - CORRECT b) Confidentiality
c) Integrity
d) Availability
True or False? A vulnerability is a security measure intended to protect an asset.
True
False - CORRECT False
An attempt by a threat agent to exploit assets without permission is referred to as:
c) a safeguard.
d) a trade-off.
a) an attack.
b) a vulnerability. - CORRECT a) an attack.
An apartment has a large window, which is covered with metal bars to prevent people from going through
the window. When analyzing the apartment's boundary, is the window considered a wall or a doorway?
b) Doorway