100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ICS-171 Exam 1 (LCC) Questions With Verified And Accurate For Guaranteed Pass| Graded A+.

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
14-08-2025
Geschreven in
2025/2026

After downloading a file from a website, you hash the file and compare the hash to the hash of the file posted on the website. What BEST describes the purpose of your actions? - correct answers To support integrity You need to send an email with a list of employee names and their social security numbers. What is the BEST choice to maintain confidentiality? - correct answers Encrypt the data A circumstance or event that could negatively impact confidentiality, integrity, or availability - correct answers threat This is NOT an example of non-repudiation. - correct answers hashing If a student graduates and does not sign up to take more classes, their email accounts are disabled. What security control is this an example of? - correct answers preventive control Which of the following commands does NOT show the network configuration of your computer? - correct answers tracert Most physical servers in an organization are currently underutilized. Management wants a better return on investment (ROI). What is a solution that will provide the best ROI? - correct answers Run many virtual servers on a few physical machines What are port numbers used for? - correct answers to identify a specific service on a computer What protocol is used to synchronize time on network devices? - correct answers NTP What is the BEST device to prevent PII data from being sent in an email to a person outside the organization? - correct answers mail gateway Which authentication service provides a SSO solution for different environments using a federated identity management system? - correct answers Shibboleth Which authentication service is NOT a SSO solution? - correct answers Kerberos What is stored in the /etc/passwd file in Linux? - correct answers information about user accounts on the system Steganography without encryption provides what goal? - correct answers obfuscation Russian hackers in Russia are sending messages from Russia to their collaborators in the USA. What is a security algorithm that they might be using for encrypting their messages? - correct answersRijndael-128, CBC The steghide command in Linux does what? - correct answers hides and encrypts one file inside a second file Instead of creating access control settings based on each student, the system administrator created a Student group that has the access control settings for a generic student. When students create an account online, their account is automatically updated with the same access control settings as the Student group. What type of access control is this? - correct answers RBAC You live on Oahu, but telecommute to an IT job in California for the higher salary. You are able to work at home; however, when you meet several of your Oahu co-workers at Starbucks to collaborate face-to-face, you and your co-workers are unable to connect to the company's network. What is the MOST likely reason that y'all cannot access the company's network? - correct answer location-based policy You are setting up an access control system that uses different security levels. For example, Top Secret Level, Secret Level, Confidential Level, and Official Use Level. What type of access control is this? - correct answers MAC You are setting up an access control system that considers the subject, object, action, and environment for authorization. For example, employees are only allowed to access the company printers when they are using a computer in the company's building during the work week during the hours of 9am to 5pm. What type of access control is this? - correct answers ABAC From a security perspective, what should be done with an employee's account when the employee leaves an organization? - correct answers disable the account What is Wireshark used for? - correct answers capturing and analyzing network traffic Which Linux command is used for capturing and analyzing network traffic? - correct answers tcpdump Which Linux command can be used for capturing HTTP traffic? - correct answers dumpcap What data is stored in an ARP table? - correct answers IP addresses and MAC addresses Which protocol uses TCP port 23? - correct answers Telnet Which protocol uses TCP port 22? - correct answers SSH Which application do we use capture and view network traffic? - correct answers Wireshark When we connect with another computer using SSH, the data sent over the network is _____. - correct answers encrypted Which protocol is used for connection oriented traffic over the network? - correct answers TCP _____ is an attack where the data in the cache is modified by the attackers. - correct answers poisoning attack ARP matches _____ addresses to _____ addresses. - correct answersIPv4, MAC What does an attacker need for a successful sniffing attack? - correct answers a protocol analyzer and cleartext traffic Which protocol is used for connectionless traffic over the network? - correct answers UDP What port number is used for SSH? - correct answers22 What protocol is a secure way to log in from your laptop to a remote server? - correct answers SSH What folder on UHUNIX is used to store web pages? - correct answers public _html Your organization requires that all employee data sent over the network be encrypted. Which of the following protocols would NOT meet this requirement? - correct answers FTP Which of the following protocols does NOT use TCP port 22? - correct answers FTP You are enabling SSH on some servers and all workstations on the organization's network. Which of the following use cases are you MOST likely supporting with this action? - correct answers Encrypt data traveling across the network You want to support the CIA triad for voice and video transmissions. What protocol will you enable on all workstations on the organization's network? - correct answers SRTP You are enabling RTP on all workstations on the organization's network. Which of the following use cases are you MOST likely supporting with this action? - correct answers Support voice and video transmission

Meer zien Lees minder
Instelling
LCC
Vak
LCC









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
14 augustus 2025
Aantal pagina's
5
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ICS-171 Exam 1 (LCC)

After downloading a file from a website, you hash the file and compare the hash to the hash of the file
posted on the website. What BEST describes the purpose of your actions? - correct answers To support
integrity



You need to send an email with a list of employee names and their social security numbers. What is the
BEST choice to maintain confidentiality? - correct answers Encrypt the data



A circumstance or event that could negatively impact confidentiality, integrity, or availability - correct
answers threat



This is NOT an example of non-repudiation. - correct answers hashing



If a student graduates and does not sign up to take more classes, their email accounts are disabled.
What security control is this an example of? - correct answers preventive control



Which of the following commands does NOT show the network configuration of your computer? -
correct answers tracert



Most physical servers in an organization are currently underutilized. Management wants a better return
on investment (ROI). What is a solution that will provide the best ROI? - correct answers Run many
virtual servers on a few physical machines



What are port numbers used for? - correct answers to identify a specific service on a computer



What protocol is used to synchronize time on network devices? - correct answers NTP



What is the BEST device to prevent PII data from being sent in an email to a person outside the
organization? - correct answers mail gateway

, Which authentication service provides a SSO solution for different environments using a federated
identity management system? - correct answers Shibboleth



Which authentication service is NOT a SSO solution? - correct answers Kerberos



What is stored in the /etc/passwd file in Linux? - correct answers information about user accounts on
the system



Steganography without encryption provides what goal? - correct answers obfuscation



Russian hackers in Russia are sending messages from Russia to their collaborators in the USA. What is a
security algorithm that they might be using for encrypting their messages? - correct answersRijndael-
128, CBC



The steghide command in Linux does what? - correct answers hides and encrypts one file inside a
second file



Instead of creating access control settings based on each student, the system administrator created a
Student group that has the access control settings for a generic student. When students create an
account online, their account is automatically updated with the same access control settings as the
Student group. What type of access control is this? - correct answers RBAC



You live on Oahu, but telecommute to an IT job in California for the higher salary. You are able to work
at home; however, when you meet several of your Oahu co-workers at Starbucks to collaborate face-to-
face, you and your co-workers are unable to connect to the company's network. What is the MOST likely
reason that y'all cannot access the company's network? - correct answer location-based policy



You are setting up an access control system that uses different security levels. For example, Top Secret
Level, Secret Level, Confidential Level, and Official Use Level. What type of access control is this? -
correct answers MAC



You are setting up an access control system that considers the subject, object, action, and environment
for authorization. For example, employees are only allowed to access the company printers when they

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
RealGrades Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
170
Lid sinds
2 jaar
Aantal volgers
52
Documenten
11662
Laatst verkocht
3 weken geleden

4,0

26 beoordelingen

5
12
4
5
3
7
2
1
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen