Page | 1
ITN 262 Midterm Exam Questions with
Detailed Verified Answers
Question: A person skilled in attacking computer systems, who uses those
skills as a security expert to help protect systems, is a
Ans: white-hat hacker
Question: AUP stands for?
Ans: Acceptable Use Policy
Question: CIA properties do not include:
Ans: authentication
Question: What is a worm?
Ans: Malware
Question: When you analyze a system using the six-phase security process,
you are performing a
Ans: risk assessment
Question: This yields a more specific set of attacks tied to our particular
threat agents
, Page | 2
Ans: Attack Matrix
Question: An attempt by a threat agent to exploit assets without permission
is referred to as
Ans: an attack,
A threat agent is an individual, organization, or group that originates a
particular threat action, motivated to attack asset
Question: A security analyst is performing a security assessment. The analyst
should not
Ans: take actions to mitigate a serious risk
Question: There are three types of tokens; they do not include which
A. Offensive tokens
B. One-time password tokens
C. Challenge-response tokens
D. Passive tokens
Ans: Offensive tokens
Question: The most recent listed hash algorithm is what?
Ans: SHA-512
Question: The following risks are associated with a weak threat except.
A. Simple trial and error password guessing
ITN 262 Midterm Exam Questions with
Detailed Verified Answers
Question: A person skilled in attacking computer systems, who uses those
skills as a security expert to help protect systems, is a
Ans: white-hat hacker
Question: AUP stands for?
Ans: Acceptable Use Policy
Question: CIA properties do not include:
Ans: authentication
Question: What is a worm?
Ans: Malware
Question: When you analyze a system using the six-phase security process,
you are performing a
Ans: risk assessment
Question: This yields a more specific set of attacks tied to our particular
threat agents
, Page | 2
Ans: Attack Matrix
Question: An attempt by a threat agent to exploit assets without permission
is referred to as
Ans: an attack,
A threat agent is an individual, organization, or group that originates a
particular threat action, motivated to attack asset
Question: A security analyst is performing a security assessment. The analyst
should not
Ans: take actions to mitigate a serious risk
Question: There are three types of tokens; they do not include which
A. Offensive tokens
B. One-time password tokens
C. Challenge-response tokens
D. Passive tokens
Ans: Offensive tokens
Question: The most recent listed hash algorithm is what?
Ans: SHA-512
Question: The following risks are associated with a weak threat except.
A. Simple trial and error password guessing