Page | 1
ITN 262 Midterm Review Questions
with Detailed Verified Answers
Question: A rational security decision, such as locking your vehicle when not
in use, is an example of:
A. reasoned paranoia
B. the hunter's dilemma
C. integrity
D. none of the above
Ans: A. reasoned paranoia
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
A. retail stores
B. universities
C. utilities
, Page | 2
D. business offices
Ans: C. utilities
Question: CIA properties do not include:
A. integrity
B. availability
C. authentication
D. confidentiality
Ans: C. authentication
Question: OCTAVE is a:
A. type of layered defense
B. risk-assessment process
C. security architecture
D. code of conduct
Ans: B. risk-assessment process
, Page | 3
Question: When you analyze a system using the six-phase security process,
you are performing a:
A. security architecture study
B. plan-do-check-act cycle
C. boundary analysis
D. risk assessment
Ans: A. security architecture study
Question: An attempt by a threat agent to exploit assets without permission
is referred to as:
Ans: an attack
Question: A person skilled in attacking computer systems, who uses those
skills as a security expert to help protect systems, is a:
Ans: White-hat hacker
Question: A security analyst is performing a security assessment. The analyst
should not:
A. securely erase all collected information that's not needed for business
purposes
ITN 262 Midterm Review Questions
with Detailed Verified Answers
Question: A rational security decision, such as locking your vehicle when not
in use, is an example of:
A. reasoned paranoia
B. the hunter's dilemma
C. integrity
D. none of the above
Ans: A. reasoned paranoia
Question: Supervisory control and data acquisition (SCADA) devices are most
often associated with:
A. retail stores
B. universities
C. utilities
, Page | 2
D. business offices
Ans: C. utilities
Question: CIA properties do not include:
A. integrity
B. availability
C. authentication
D. confidentiality
Ans: C. authentication
Question: OCTAVE is a:
A. type of layered defense
B. risk-assessment process
C. security architecture
D. code of conduct
Ans: B. risk-assessment process
, Page | 3
Question: When you analyze a system using the six-phase security process,
you are performing a:
A. security architecture study
B. plan-do-check-act cycle
C. boundary analysis
D. risk assessment
Ans: A. security architecture study
Question: An attempt by a threat agent to exploit assets without permission
is referred to as:
Ans: an attack
Question: A person skilled in attacking computer systems, who uses those
skills as a security expert to help protect systems, is a:
Ans: White-hat hacker
Question: A security analyst is performing a security assessment. The analyst
should not:
A. securely erase all collected information that's not needed for business
purposes