100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITC 341 MIDTERM EXAM STUDY GUIDE 2025/2026 QUESTIONS AND ANSWERS 100% PASS

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
01-12-2025
Written in
2025/2026

ITC 341 MIDTERM EXAM STUDY GUIDE 2025/2026 QUESTIONS AND ANSWERS 100% PASS

Institution
ITC 341
Course
ITC 341










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITC 341
Course
ITC 341

Document information

Uploaded on
December 1, 2025
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITC 341 MIDTERM EXAM STUDY
GUIDE 2025/2026 QUESTIONS AND
ANSWERS 100% PASS




Which step occurs first during the attack phase of a penetration test? - ANS Gaining access


Barry is participating in a cybersecurity wargame exercise. His role is to attempt to break into
adversary systems. What team is he on? - ANS Red team


Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to
follow the standard process proposed by NIST, which one of the following steps would come
first? - ANS Identify threats


What is the first step during the attack phase of a penetration test? - ANS Gaining access


Which team in a cybersecurity wargame attempts to break into adversary systems? - ANS Red
team


What is the first step in the NIST standard process for a cybersecurity risk assessment? -
ANS Identify threats


What type of firewall protects against SQL injection and cross-site scripting? - ANS Web
Application Firewall (WAF)




1 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

,What risk management strategy did Paul use by implementing a network firewall? - ANS Risk
mitigation


When should penetration testers obtain written authorization for their test? - ANS During the
planning phase


Which security company originally created the base set of indicators for OpenIOC? -
ANS Mandiant


What type of threat actor targets governments and businesses for political reasons? -
ANS Hacktivists


What is frequently conducted in the requirements-gathering stage of intelligence gathering? -
ANS Review of security breaches or compromises


What type of assessment is particularly useful for identifying insider threats? -
ANS Behavioral assessment


Which threat actor typically has the greatest access to resources? - ANS Nation-state actors


What does Jason's intelligence about USB key drops represent? - ANS A possible attack vector


What tool is used to capture IP traffic information? - ANS NetFlow


What is the process of verifying that a Word document does not contain hidden content? -
ANS Metadata scrubbing


What type of server is indicated by the dhcpd.conf entry for host db1? - ANS Microsoft SQL
Server




2 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

, Which organization manages the global IP address space? - ANS IANA


What technique is used in the command 'dig axfr @dns-server example.com'? - ANS Zone
transfer


Which is not a common DNS anti-harvesting technique? - ANS Registering manually


What minimum level of impact must a system have under FISMA for discoverability
assessment? - ANS Moderate


Which federal law requires vulnerability scanning on information systems operated by federal
agencies? - ANS FISMA


Which activity is not part of the vulnerability management life cycle? - ANS Reporting


What approach to vulnerability scanning incorporates information from agents on target
servers? - ANS Agent-based scanning


What is the purpose of Common Platform Enumeration (CPE) in SCAP? - ANS CPE provides
standardized nomenclature for product names and versions.


What tool can administrators use to identify systems on a network before conducting
vulnerability scans? - ANS Asset inventory


What does SSO stand for in the context of user authentication? - ANS Single Sign-On,
allowing users to log into multiple services without re-entering credentials.


What design principle requires verification and validation of each action requested? -
ANS Zero trust




3 @COPYRIGHT 2025/2026 ALLRIGHTS RESERVED.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Fyndlay Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
347
Member since
1 year
Number of followers
80
Documents
18286
Last sold
3 days ago
Scholar\'s Sanctuary.

Explore a Vast Collection of Finely Made Learning Materials.

3.7

67 reviews

5
31
4
8
3
13
2
6
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions