100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITSY 1300 CHAPTER 1-4 EXAM QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
41
Grade
A+
Uploaded on
20-11-2025
Written in
2025/2026

ITSY 1300 CHAPTER 1-4 EXAM QUESTIONS AND ANSWERS

Institution
ITSY 1300
Course
ITSY 1300











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITSY 1300
Course
ITSY 1300

Document information

Uploaded on
November 20, 2025
Number of pages
41
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITSY 1300 CHAPTER 1-4 EXAM
QUESTIONS AND ANSWERS

The ____________________ data file contains the hashed representation of the user's
password.
Select one:
a.
SAM
b.
FBI
c.
SNMP
d.
SLA - Answer-a.
SAM

In a ____________________ attack, the attacker sends a large number of connection
or information requests to disrupt a target from a small number of sources.
Select one:
a.
denial-of-service
b.
virus
c.
distributed denial-of-service
d.
spam - Answer-a.
denial-of-service

An advance-fee fraud attack involves the interception of cryptographic elements to
determine keys and encryption algorithms.
Select one:
True
False - Answer-False

,A sniffer program can reveal data transmitted on a network segment including
passwords, the embedded and attached files-such as word-processing documents-and
sensitive data transmitted to or from applications.
Select one:
True
False - Answer-True

A(n) polymorphic threat is one that over time changes the way it appears to antivirus
software programs, making it undetectable by techniques that look for preconfigured
signatures. _________________________
Select one:
True
False - Answer-True

Web hosting services are usually arranged with an agreement defining minimum service
levels known as a(n) ____.
Select one:
a.
MIN
b.
MSL
c.
SLA
d.
SSL - Answer-c.
SLA

____________________ is the premeditated, politically motivated attacks against
information, computer systems, computer programs, and data which result in violence
against noncombatant targets by subnational groups or clandestine agents.
Select one:
a.
infoterrorism
b.
cyberterrorism
c.
hacking
d.
cracking - Answer-b.
cyberterrorism

"4-1-9" fraud is an example of a ____________________ attack.
Select one:
a.
social engineering
b.

,spam
c.
virus
d.
worm - Answer-a.
social engineering

Employees are not deterred by the potential loss of certification or professional
accreditation resulting from a breach of a code of conduct as this loss has no effect on
employees' marketability and earning power.
Select one:
True
False - Answer-False

In a study on software license infringement, those from United States were significantly
more permissive than those from the Netherlands and other countries.
_________________________
Select one:
True
False - Answer-False

Studies on ethics and computer use reveal that people of different nationalities have
different perspectives; difficulties arise when one nationality's ethical behavior violates
the ethics of another national group.
Select one:
True
False - Answer-True

Which of the following acts defines and formalizes laws to counter threats from
computer related acts and offenses?
Select one:
a.
Computer Fraud and Abuse Act of 1986
b.
Freedom of Information Act (FOIA) of 1966
c.
Electronic Communications Privacy Act of 1986
d.
Federal Privacy Act of 1974 - Answer-a.
Computer Fraud and Abuse Act of 1986

For policy to become enforceable it only needs to be distributed, read, understood, and
agreed to.
Select one:
True
False - Answer-False

, An information system is the entire set of __________, people, procedures, and
networks that make possible the use of information resources in the organization.
Select one:

a.
data
b.
software
c.
hardware
d.
All of the above - Answer-d.
All of the above

Applications systems developed within the framework of the traditional SDLC are
designed to anticipate a software attack that requires some degree of application
reconstruction.
Select one:

True
False - Answer-False

Part of the logical design phase of the SecSDLC is planning for partial or catastrophic
loss. ____ dictates what immediate steps are taken when an attack occurs.
Select one:
a.
Security response
b.
Continuity planning
c.
Disaster recovery
d.
Incident response - Answer-d.
Incident response

__________ security addresses the issues necessary to protect the tangible items,
objects, or areas of an organization from unauthorized access and misuse.
Select one:
a.
Object
b.
Personal
c.
Physical
d.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Perfectscorer Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
484
Member since
3 year
Number of followers
354
Documents
8849
Last sold
1 week ago

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Read more Read less
3.6

75 reviews

5
27
4
15
3
18
2
5
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions