100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

IT Security Defense against the digital dark arts Questions and Answers 100- Pass

Puntuación
-
Vendido
-
Páginas
54
Grado
A+
Subido en
24-07-2025
Escrito en
2024/2025

IT Security Defense against the digital dark arts Questions and Answers 100- Pass

Institución
APN - Advanced Practice Nurse
Grado
APN - Advanced Practice Nurse











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
APN - Advanced Practice Nurse
Grado
APN - Advanced Practice Nurse

Información del documento

Subido en
24 de julio de 2025
Número de páginas
54
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

IT Security: Defense against the digital
dark arts Questions and Answers
100% Pass
Phishing, baiting, and tailgating are examples of attacks.
Malware
Password
Social engineering
Network ✔✔Social engineering


An attacker could redirect your browser to a fake website login page using what kind of attack?
Injection attack
DNS cache poisoning attack
DDoS attack
SYN flood attack ✔✔DNS cache poisoning attack


A(n) attack is meant to prevent legitimate traffic from reaching a
service. Injection
Password
Denial of Service
DNS Cache poisoning ✔✔Denial of Service


The best defense against password attacks is using strong .
Firewall configs
Passwords
Encryption
Antimalware software ✔✔Passwords

,Which of these is an example of the confidentiality principle that can help keep your data hidden
from unwanted eyes?
Preventing data loss
Making sure the data hasn't been tampered with
Preventing an unwanted download
Protecting online accounts with password protection ✔✔Protecting online accounts with password
protection


Which of these is true of vulnerabilities? Check all that apply.
A vulnerability is a flaw in the code of an application that can be exploited.
An exploit is the possibility of taking advantage of a vulnerability bug in
code. A vulnerability is the possibility of suffering a loss in the event of an
attack.
An exploit takes advantage of bugs and vulnerabilities. ✔✔A vulnerability is a flaw in the code
of an application that can be exploited.
An exploit takes advantage of bugs and vulnerabilities.


Which of these is true of blackhat and whitehat hackers?
Blackhats are malicious. Whitehats exploit weakness to help mitigate threats.
Blackhats work with owners to fix problems. Whitehats are just trying to get into a system.
Blackhats try to find weaknesses, but whitehats don't.
Blackhats and whitehats shouldn't be trusted. ✔✔Blackhats are malicious. Whitehats exploit
weakness to help mitigate threats.


A hacker infected your computer to steal your Internet connection and used your machine's
resources to mine Bitcoin. What is the name of this kind of attack?
Ransomware
Adware
Spyware
A bot ✔✔A bot

,A hacker stood outside a building and spun up a wireless network without anyone's knowledge.
At that point, the hacker was able to gain unauthorized access to a secure corporate network.
Which of these is the name of this type of attack?
A DNS Cache Poisoning attack
A Denial-of-Service (DoS) attack
A Rogue AP (Access Point) attack
SYN flood attack ✔✔A Rogue AP (Access Point) attack


What can occur during a ping of death (POD) attack? Check all that
apply. A Denial-of-Service (DoS)
A buffer overflow
Baiting
Remote code execution ✔✔A Denial-of-Service (DoS)
A buffer overflow
Remote code execution


How can injection attacks be prevented? Check all that apply.
Input validation
Flood guards
Log analysis systems
Data sanitization ✔✔Input validation
Data sanitization


Which of these is a way to help prevent brute-force attacks? Check all that apply.
Strong passwords
Password crackers
Captchas
Using a precompiled list of common passwords ✔✔Strong passwords
Captchas

, An end-user received an email stating his bank account was compromised, and that he needs to
click a link to reset his password. When the user visited the site, he recognized it as legitimate
and entered his credentials which were captured by a hacker. What type of social engineering
attack does this describe?
A baiting attack
A phishing
attack
A SQL injection attack
A tailgating attack ✔✔A phishing attack


When cleaning up a system after a compromise, you should look closely for any that may
have been installed by the attacker.
Backdoors
Poisoned DNS caches
Injection attacks
Rogue APs ✔✔Backdoors


The best defense against injection attacks is to .
Use antimalware software
Use input validation
Use strong passwords
Use a firewall ✔✔Use input validation


Which of these is an example of the integrity principle that can ensure your data is accurate and
untampered with?
Keeping a symmetric key secret
Using MACs (Message Authentication Codes)
Implementing flood guards
Using Encapsulating Security Payload ✔✔Using MACs (Message Authentication Codes)
Using Encapsulating Security Payload


What's the difference between a virus and a worm?
$17.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
frinyoo

Conoce al vendedor

Seller avatar
frinyoo Calfornia Southern Law School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1
Miembro desde
2 año
Número de seguidores
0
Documentos
809
Última venta
6 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes