Page 1 of 103
ITSY 1300 FINAL EXAM 350 QUESTIONS AND
WELL EXPLAINED ANSWERS LATEST UPDATE
JUST RELEASED THIS YEAR
Question: 1. A company uses a fence to deter physical access. An audit report concluded that
since the
fence can be easily scaled, additional measures should be implemented. What additional
fencing-deterrent measure could the company implement to gain an added layer of
protection? Select three.
a. Anticlimb collar
b. Roller barrier
c. Rotating spikes
d. Chain-link fence
e. Barricades in front of the fence - CORRECT ANSWER✔✔a. Anticlimb collar
b. Roller barrier
c. Rotating spikes
1. You receive a call from someone pretending to be a government agent. They claim there is
, Page 2 of 103
an issue with your taxes and you need to provide certain information to clear up the problem.
However, the caller's true goal is to obtain private information. Which of the following best
describes this behavior?
a. Vishing
b. Smishing
c. Vectoring
d. Pretexting - CORRECT ANSWER✔✔d. Pretexting
Question: 3. An individual who was recently fired goes to their former place of employment on
a
weekend. Since they are unable to enter, security goes to the front door to inquire. The fired
employee says they forgot their access card and just needs to pick up their tablet in their
office. What attack surface is the former employee trying to exploit?
a. Human vector
b. Mobile device
c. Hardware
d. Specialized vector - CORRECT ANSWER✔✔a. Human vector
Question: 15. Lamarr receives a text message indicating the password to his bank account has
been
, Page 3 of 103
changed but needs verification to commit the change. It includes a number to call and a link,
both of which will lead to fraud if Lamarr follows through with the instructions. This is an
example of what type of attack?
a. Vishing
b. Smishing
c. Urgency attack
d. Account compromise attack - CORRECT ANSWER✔✔b. Smishing
Question: 17. Which of the following best describes what could be considered a security
buffer? Select
two.
a. Lobby of a bank
b. Ticket booth at a cinema
c. Reception area of a company
d. Waiting room at a doctor's office - CORRECT ANSWER✔✔c. Reception area of a
company
d. Waiting room at a doctor's office
, Page 4 of 103
Question: 1. Alpha and Beta are having a conversation in English. Gamma, who is a gifted
conversationalist and tends to
monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma,
they start
speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do?
a. They employed a form of tokenization.
b. They employed a form of encryption.
c. They employed a form of substitution.
d. They employed a form of steganography. - CORRECT ANSWER✔✔b. They employed a form of
encryption.
Question: 9. An attacker is scanning wireless networks and discovers that one of them is set up
to support the two most
recent protocols. What type of attack is the malicious actor most likely to launch to try to
breach the security
settings of the wireless device?
a. Entropy attack
b. Protocol attack
c. Upgrade attack
d. Downgrade attack - CORRECT ANSWER✔✔d. Downgrade attack
ITSY 1300 FINAL EXAM 350 QUESTIONS AND
WELL EXPLAINED ANSWERS LATEST UPDATE
JUST RELEASED THIS YEAR
Question: 1. A company uses a fence to deter physical access. An audit report concluded that
since the
fence can be easily scaled, additional measures should be implemented. What additional
fencing-deterrent measure could the company implement to gain an added layer of
protection? Select three.
a. Anticlimb collar
b. Roller barrier
c. Rotating spikes
d. Chain-link fence
e. Barricades in front of the fence - CORRECT ANSWER✔✔a. Anticlimb collar
b. Roller barrier
c. Rotating spikes
1. You receive a call from someone pretending to be a government agent. They claim there is
, Page 2 of 103
an issue with your taxes and you need to provide certain information to clear up the problem.
However, the caller's true goal is to obtain private information. Which of the following best
describes this behavior?
a. Vishing
b. Smishing
c. Vectoring
d. Pretexting - CORRECT ANSWER✔✔d. Pretexting
Question: 3. An individual who was recently fired goes to their former place of employment on
a
weekend. Since they are unable to enter, security goes to the front door to inquire. The fired
employee says they forgot their access card and just needs to pick up their tablet in their
office. What attack surface is the former employee trying to exploit?
a. Human vector
b. Mobile device
c. Hardware
d. Specialized vector - CORRECT ANSWER✔✔a. Human vector
Question: 15. Lamarr receives a text message indicating the password to his bank account has
been
, Page 3 of 103
changed but needs verification to commit the change. It includes a number to call and a link,
both of which will lead to fraud if Lamarr follows through with the instructions. This is an
example of what type of attack?
a. Vishing
b. Smishing
c. Urgency attack
d. Account compromise attack - CORRECT ANSWER✔✔b. Smishing
Question: 17. Which of the following best describes what could be considered a security
buffer? Select
two.
a. Lobby of a bank
b. Ticket booth at a cinema
c. Reception area of a company
d. Waiting room at a doctor's office - CORRECT ANSWER✔✔c. Reception area of a
company
d. Waiting room at a doctor's office
, Page 4 of 103
Question: 1. Alpha and Beta are having a conversation in English. Gamma, who is a gifted
conversationalist and tends to
monopolize conversations, approaches Alpha and Beta. As soon as Alpha and Beta see Gamma,
they start
speaking in Spanish, but Gamma does not understand. What did Alpha and Beta just do?
a. They employed a form of tokenization.
b. They employed a form of encryption.
c. They employed a form of substitution.
d. They employed a form of steganography. - CORRECT ANSWER✔✔b. They employed a form of
encryption.
Question: 9. An attacker is scanning wireless networks and discovers that one of them is set up
to support the two most
recent protocols. What type of attack is the malicious actor most likely to launch to try to
breach the security
settings of the wireless device?
a. Entropy attack
b. Protocol attack
c. Upgrade attack
d. Downgrade attack - CORRECT ANSWER✔✔d. Downgrade attack