100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 262 MIDTERM EXAM QUESTIONS AND ANSWERS 2025

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
04-11-2025
Written in
2025/2026

ITN 262 MIDTERM EXAM QUESTIONS AND ANSWERS 2025

Institution
ITN 262
Course
ITN 262










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 262
Course
ITN 262

Document information

Uploaded on
November 4, 2025
Number of pages
16
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 262 MIDTERM LATEST
EXAM
The primary file-access rights in Unix are:
Read, Control and Write
Today's access control lists (ACLs) implement one of several
designs. Pick the designs from the following list:
All of the above
Regarding access permissions in Windows, the owner of a shared
folder may read, modify, and delete other user's files.
true
Regarding access permissions in Windows, the owner of a shared
folder may read, modify, and delete other user's files.
true
Both Windows and Unix include permission flags in their file
security mechanisms.
false
Mac OS-X allows you to add ACL entries for groups as well as
users.
true
Windows does not deny an access right by omitting it, but it allows
you to explicitly deny a right.
true
END OF
PAGE
1

, ITN 262 MIDTERM LATEST
EXAM
PCI DSS is a set of standards, not a law, that applies to merchants
who handle customer credit card information.
true
In Unix the command "Chmod" Changes the rights granted to the
owner, group, or rest of the world, for a file
true
In Unix the command "Chown" Changes the identity of a file's
owner.
true
Trojan horse software illustrates a common shortcoming of file-
based access control.
true
Using a personal computer with full admin rights does not enable
the user to minimize security threats
true
Transitive trust is describes as:
The implicit spreading of trust
An Audit trails are records in a set of files called:
event log
Examples of tailored policies are:
END OF
PAGE
2

, ITN 262 MIDTERM LATEST
EXAM
all of the above
Some operating systems provide ways of temporarily granting
administrative to people logged in to regular accounts.
true
When something important (an event) takes place inside a program,
the program creates:
log entries
An individual/owner with full rights to read, modify or delete
anything in a folders, is said to have:
owner rights




What are the fundamental or cornerstone principles of information
security?
Confidentiality, Integrity and Availability
A personal laptop is something you own and possess. A company
laptop or cell phone is something you possess. Can you install,
modify or update software applications on a company laptop or any
other company-own mobile device?

END OF
PAGE
3

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Teacher101 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
378
Member since
1 year
Number of followers
71
Documents
8836
Last sold
9 hours ago

Quality is my middle name.....100% ...my policy is to create and nurture people of quality by continuous education and training.....i guaranteed good grades 100% Feel free to get in touch through inbox...anything regarding help or issue with the exams posted... Finally after purchase please leave a good rating if satisfied with my work.... All the best as we continue working to improve ourselves through education

4.6

264 reviews

5
217
4
14
3
24
2
3
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions