Cist 1601 Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Cist 1601? On this page you'll find 20 study documents about Cist 1601.
All 20 results
Sort by
-
CIST 1601 Information Security Chapter 5 (A+ Graded Already)
- Exam (elaborations) • 31 pages • 2023
-
- $13.49
- + learn more
Which of the following is the main difference between a DOS attack and a DDoS attack? 
 
O The DDoS attack spoofs the source IP address.The DDoS attack uses zombie computers.The DDoS attack does not respond to SYN ACK packets in the threeway handshake process.The DDoS attack uses an amplification network correct answers The DDoS attack uses zombie computers. 
 
(denial of service DoS, single atacker directs an attack at a single target.) 
(distributed of service attack DDoS, multiple PCs attack)...
-
Test Bank CIST 1601 | CompTIA Security + SYO-301 Certification Exam A
- Exam (elaborations) • 139 pages • 2022
-
- $9.89
- + learn more
CIST 1601 Test Bank. 
CompTIA Security + SYO-301 
Certification Exam A 
1. Actively monitoring data streams in search of malicious code or behavior is an 
example of: 
a. load balancing. 
b. an Internet proxy. 
c. URL filtering. 
d. content inspection. 
ANS: D 
2. Which of the following network devices would MOST likely be used to detect but not 
react to suspicious behavior on the network? 
a. Firewall 
b. NIDS 
c. NIPS 
d. HIDS 
ANS: B 
3. The security administrator is getting reports from use...
-
CIST 1601 Ch03 (with correct answers 100%)
- Exam (elaborations) • 27 pages • 2023
-
- $13.99
- + learn more
3.1 Security Policies correct answers 3.1 Security Policies 
 
Which of the following is defined as a contract that prescribes the technical support or business parameters a provider will bestow to its client? 
 
 
Final audit report 
Certificate practice statement 
Service level agreement 
 Mutual aid agreement correct answers Service level agreement 
 
HIPAA is a set of federal regulations that define security guidelines. What do HIPAA guidelines protect? 
 
Nonrepudiation 
Availability 
Pr...
-
CIST 1601 Final Exam Review (all solved)
- Exam (elaborations) • 5 pages • 2023
-
- $8.99
- + learn more
Weakest part of an informatoin security system correct answers literally just being on the internet. 
 
CIA correct answers Confidentially, Integrity and Availability 
 
Threat correct answers Anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset 
 
Vulnerability correct answers Weakness or gaps in a security program that can be exploited by threats 
 
Risk correct answers The potential for loss, damage, or destruction of an asset as a ...
-
CIST 1601 Ch02 (A+ Guaranteed)
- Exam (elaborations) • 15 pages • 2023
-
- $11.99
- + learn more
Stealing information. 
 
Exploitation 
Staging 
Reconnaissance 
Breaching 
Escalating privileges correct answers Exploitation 
 
A script kiddie is a threat actor who lacks knowledge and sophistication. Script kiddie attacks often seek to exploit well-known vulnerabilities in systems. 
What is the best defense against script kiddie attacks? 
 
A. Implement email filtering systems. 
B. Keep systems up-to-date and use standard security practices. 
C. Properly secure and store data backups. 
D. bu...
And that's how you make extra money
-
CIST 1601 Final Exam Spring 2023 (100%Acknowledged)
- Exam (elaborations) • 10 pages • 2023
-
- $10.99
- + learn more
1. Which is a form of cryptography provides confidentiality with a weak form of authentication or integrity? 
 
Symmetric key encryption 
Asymmetric Key encryption 
Hash algorithm 
Key distribution correct answers Symmetric-key encryption 
 
2. What is the main difference between a worm and a virus? 
 
A worm tries to the steal information, while I virus tries to destroy data. 
A worm is restricted to one system, while a virus can spread from system to system. 
A worm can replace itself, while a...
-
CIST 1601 Final Exam (with Accurate Solutions)
- Exam (elaborations) • 7 pages • 2023
-
- $9.49
- + learn more
1. The __________ methodology has been used by many organizations and requires that issues be addressed from the general to the specific, and that the focus be on systematic solutions instead of individual problems. correct answers Answer: Bullseye 
 
2. "Unfreezing" in the Lewin change model involves thawing hard-and-fast habits and established procedures. (T/F) correct answers Answer: True 
 
3. In the __________ process, measured results are compared against expected results. correct answer...
-
CIST 1601 (with 100% Errorless answers)
- Exam (elaborations) • 7 pages • 2023
-
- $8.99
- + learn more
Cleartext is a name for text that appears to be transparent or invisible during a data transmission. correct answers False 
 
A threat is any action or actor that could damage an asset. correct answers True 
 
One of the functions of a EULA is to protect the software vendor from liability. correct answers True 
 
The standard CIA triangle consists of Confidentiality, Integrity, and Authorization. correct answers False 
 
An example of cryptography is to encrypt data, thus producing ciphertext co...
-
Information Security Fundamentals - CIST 1601 Final Exam Study Guide (A+ Guaranteed)
- Exam (elaborations) • 11 pages • 2023
-
- $10.99
- + learn more
* Describe the multiple types of security systems present in many organizations. correct answers 1.) Physical Security - protect items, objects, and places 
2.) Personnel security - protect individual access to the organization 
3.) Operation security - protect details of activities 
4.) Communications security - protect communications media, technology, and content 
5.) Network security - protect networking components, connections, and contents 
6.) Information security - protect the confidenti...
-
Security Fundamentals Exam Study Guide (CIST 1601) with 100% Accurate Answers.
- Exam (elaborations) • 4 pages • 2023
-
- $7.99
- + learn more
Which network device is capable of blocking network connections that are identified as potentially malicious? correct answers Demilitarized Zone (DMZ) 
 
What is NOT a common endpoint for a VPN connection used for remote network access? correct answers Firewalls 
 
Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol uses secure, encrypted connections? correct answers Port 22 
 
Which risk is most effectively mitigat...
Did you know that on average a seller on Stuvia earns $82 per month selling study resources? Hmm, hint, hint. Discover all about earning on Stuvia