100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 262 MIDTERM EXAM 2025/2026 ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS (100% VERIFIED) RATED A+.

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
11-10-2025
Written in
2025/2026

ITN 262 MIDTERM EXAM 2025/2026 ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS (100% VERIFIED) RATED A+. ITN 262 MIDTERM EXAM 2025/2026 ACTUAL EXAM QUESTIONS AND CORRECT ANSWERS (100% VERIFIED) RATED A+.

Institution
ITN 262
Course
ITN 262











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 262
Course
ITN 262

Document information

Uploaded on
October 11, 2025
Number of pages
32
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Page |1


ITN 262 MIDTERM EXAM 2025/2026 ACTUAL EXAM
QUESTIONS AND CORRECT ANSWERS (100%
VERIFIED) RATED A+.

Supervisory control and data acquisition (SCADA) devices are most often associated with:

b) utilities.

c) business offices.

d) universities.

a) retail stores. - CORRECT b) utilities.

What is a worm?

c) Blocks flow of computer traffic

b) Sends spam

a) Malware

d) Denial of service - CORRECT a) Malware

True or False? Botnets can (often) perform distributed denial of service (DDoS) attacks in which
thousands of individual computers send overwhelming amounts of traffic at a victim's computer.

True

False - CORRECT True

Desktop malware may not represent a direct threat to ________- or PLC-based equipment, but practical
attacks exist on these systems.

a) DOS

d) SCADA

c) PLC

b) FRA - CORRECT d) SCADA

True or False? In requirement-based security, we identify and prioritize our security needs in a risk
assessment process.

True

False - CORRECT True

, Page |2

Car ignition locks are an example of what type of decision?

b) Relativistic-based

c) Rule-based

d) Hunter's dilemma

a) Requirement-based - CORRECT c) Rule-based

Both forms of the RMF illustrate a(n) _______ engineering process as a way to plan, design, and build a
complicated system.

a) computer

d) information

b) security

c) systems - CORRECT c) systems

True or False? The security process and the Information engineering process find their origin in the
concept of Continuous Improvement.

True

False - CORRECT False

True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls
motors, valves, and other devices in industrial applications.

True

False - CORRECT True

A security decision, such as locking your vehicle when not in use, is an example of:

b) the hunter's dilemma.

d) None of these is correct.

c) integrity.

a) rule-based security. - CORRECT a) rule-based security.

Which of the following is an example of a rule-based security decision?

d) Trying to outdo a neighbor's security measures

b) Performing a step-by-step security analysis

c) Applying "security theater"

, Page |3


a) Locking a car's ignition - CORRECT a) Locking a car's ignition

Which of the following is an example of security theater?

c) Trying to outrun a hungry bear

a) Locking a car's ignition

b) Installing a fake video camera

d) Choosing a defense based on a systematic, step-by-step process - CORRECT b) Installing a fake video
camera

True or False? The term "security theater" refers to security measures intended to make potential victims
feel safe and secure without regard to their effectiveness.

True

False - CORRECT True

Risk Management Framework is a way to assess _______________ risks when developing large-scale
computer systems. - CORRECT cybersecurity

True or False? Security Category RMF begins with a high-level estimate of the impact caused by cyber
security failures.

True

False - CORRECT True

True or False?

A vulnerability is a weakness in the boundary that protects the assets from the threat agents.

True

False - CORRECT True

True or False? A threat agent is a person who did attack our assets, while an attacker might attack an
asset.

True

False - CORRECT False

Which of the following is a person who has learned specific attacks on computer systems and can use
those specific attacks?

d) Hacker

a) Cracker

, Page |4

b) Script kiddy

c) Phone phreak - CORRECT a) Cracker

CIA properties do not include:

d) availability.

a) confidentiality.

c) authentication.

b) integrity. - CORRECT c) authentication.

Which of the following are the CIA properties?

d) Availability

f) Implementation

c) Integrity

a) Authentication

b) Confidentiality

e) Identity - CORRECT b) Confidentiality

c) Integrity

d) Availability

True or False? A vulnerability is a security measure intended to protect an asset.

True

False - CORRECT False

An attempt by a threat agent to exploit assets without permission is referred to as:

c) a safeguard.

d) a trade-off.

a) an attack.

b) a vulnerability. - CORRECT a) an attack.

An apartment has a large window, which is covered with metal bars to prevent people from going through
the window. When analyzing the apartment's boundary, is the window considered a wall or a doorway?

b) Doorway

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
testmaster1 Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
8 months
Number of followers
0
Documents
548
Last sold
5 days ago
Test Master

Test Master is professional doctor who have attained a masters degree in nursing studies and also holds degree in philosophy, religious studies and economics from West Cost university.

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions