ISSC 262 MidTerm Exam 2024 Questions and Answers Full Solved 100%;AMU
ISSC 262 MidTerm Exam 2024 Questions and Answers Full Solved 100%;AMU ISSC 262 ISSC 262 MidTerm Exam 2024 Questions and Answers Full Solved 100%;AMU Attempt Score 100 / 100 - 10 % Overall Grade (Highest Attempt) 100 / 100 - 10 % Question 1 4 / 4 points ISSC262 MidTerm Exam - Results Attempt 1 of 1 Sniffing can be used to . Question options: troubleshoot connections investigate malware detect abnormal behavior io 4 / po PSK mode is . Question options: a pre-salted key more secure enterprise ready io 4 / po The characteristics of Ethernet include all but which one of the following? Question options: Collision detection Sends traffic to all nodes on a hub CSMA/CD io 4 / po Checking DNS for words like "test" or "solaris" is an example of a technique for which of the following activities? Question options: Remove unwanted listings. Make sure you found the right company. Check the zone file. io 4 / po Deploying an IDS into an environment for which it is not designed can fail for which of the following reasons? Question options: Warnings may be incorrect Warnings may be irrelevant Neither A nor B io 4 / po Filtering user input to remove HTML and script tags can help prevent which of the following attacks? Question options: XSRF SQL injection All of the above io 4 / po CCTV can be used as which of the following type of tools? Question options: Preventive only Detective and reactive Reactive and preventative io 4 / po A skilled hacker who sometimes acts illegally and sometimes acts with good intent is a . Question options: white hat black hat criminal io 4 / po A SYN scan is useful for which of the following purposes? Question options: Checking for FIN flags Sending packets with no flags set Sending packets with all flags set ion 4 / po The Sarbanes-Oxley Act governs what type of reporting? Question options: Newspaper Security Governmental ion 4 / po The main purposes for using cryptography include all but which one of the following? Question options: Privacy Authenticity Integrity ion 4 / po Approximately how many distributions of Linux are available in different forms and formats? Question options: 100 200 1,000 ion 4 / po At which layer of the TCP/IP model are virus scanners and secure coding used as control measures? Question options: Host-to-Host Network Physical ion 4 / po An attacker who adds commands to a database query has likely used . Question options: command overload SQL addition database override ion 4 / po Focal length defines which of the following camera qualities? Question options: Degree of granularity Ability to zoom Scope of color ion 4 / po A false acceptance rate is also known as which of the following errors? Question options: Type A Type B Type 1 ion 4 / po In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first? Question options: LACNIC APNIC ARIN ion 4 / po In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued? Question options: dir/p cp -v rm -al ion 4 / po Inserting <script>action</script> is an example of what type of Web attack? Question options: Database attack SQL injection Sample file exploit ion 4 / po The core component of every operating system is which of the following? Question options: Shell User interface BIOS ion 4 / po A standard format for reporting a security incident prevents which of the following? Question options: Copy and paste errors The same type of incident in the future Incomplete risk assessments ion 4 / po Inserting code, such as <script src= Question options: SQL injection Cross-site reference forgery Brute-force attacks ion 4 / po Vulnerabilities in the database platform are best handled by using which of the following controls? Question options: Firewalling Use nonstandard ports, if possible All of the above ion 4 / po Single Correct - points EditNessus® is a . Question options: port scanner XSS scanner Web scanner ion 4 / po Factors that affect the emanations of a wireless network include all but which one of the following? Question options: Atmospheric conditions Building materials Nearby devices
Escuela, estudio y materia
- Institución
- ISSC 262
- Grado
- ISSC 262
Información del documento
- Subido en
- 4 de julio de 2024
- Número de páginas
- 10
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
issc 262
-
sniffing can be used to
-
psk mode is
-
issc 262 midterm exam 2024 questions and answers f
-
the characteristics of ethernet include all but wh