Upgrade to remove ads
ITN 261 Mid Term
Terms in this set (49)
Which of the following is a penetration testing framework?
Which of the following is a corporate governance law that affects public corporations' financial reporting?
In which of the following phases does an attacker passively acquire information about the intended victim's systems?
Which of the following describes penetration testing as a four-step process?
They commit to lifelong learning
Which of the following statements is most accurate in regard to successful security professionals?
Which of the following best describes the act of gathering material that has been discarded or left in unsecured or unguarded receptacles?
Which of the following terms best describes hackers that occupy the lowest level of the hacker hierarchy?
Which of the following is not a typical step in the ethical hacking process?
Ethical hacking if you have permission
Attacking a company's Web applications to prevent them from being vulnerable is an example of which of the following?
Which of the following adheres to an ethic of "do no harm"?
Social networking sites
Which of the following is most likely to provide a wealth of publicly posted information about an organization's employees?
Which of the following is the address range for Class B IP
Reviewing job listings posted by the targeted company
Which of the following examples best portrays passive information gathering?
Request for Comments (RFC) archive
Web resources used to footprint a company include all but which one of the following?
Passive information gathering
Which of the following best describes the first two steps of the footprinting process?
In order to locate domain information on a European organization, which of the following Regional Internet Registries would be checked first?
Which of the following databases would be valuable for obtaining information about a company's financial history?
Instructs Google to search for a term within the title of a document
Which of the following best describes the purpose of the in title command?
In order to locate domain information on a Canadian organization, which of the following Regional Internet Registries would be checked first?
Which of the following files is edited to block a search engine's bots from indexing an organizational Web site?
A fence that is at least __________ in height presents a psychological deterrent to most potential intruders.
When choosing between guards and dogs for physical, which of the following factors must be considered?
The phone number is publicly available
If an active fax machine is discovered during an assessment, which of the following is of the least concern?
Horizontal and vertical view
Focal length defines which of the following camera qualities?
Which of the following bio metric authentication methods is most frequently found on laptops?
Which of the following lock grades should be selected in order to appropriately protect critical business assets?
A false acceptance rate is also known as which of the following errors?
A bollard is used as a physical security control against which of the following?
Detective and reactive
CCTV can be used as which of the following type of tools?
A PIDA is an intrusion detection system used exclusively in conjunction with which of the following?
Which of the following is a common application layer attack?
Lack of startup and shutdown
Which of the following is a factor that makes scanning UDP more difficult?
Travels only 56 hops
All but which one of the following is security vulnerability found in RIP?
Delivery of IP packets
Which of the following activities is the responsibility of the OSI reference model transport layer?
It makes a best effort at delivering information
Which of the following statements is true in regard to TCP?
Sends traffic using a token
The characteristics of Ethernet include all but which one of the following?
Logical errors and diagnostics
Which of the following is the main purpose of ICMP?
OSPF operates at which of the following layers of the OSI model?
Which of the following represents a valid ethical hacking test methodology?
When hackers talk about standards of behavior and moral issues of right and wrong, what are they referring to?
Black hat hacker
A hacker with computing skills and expertise to launch harmful attacks on computer networks and who uses those skills illegally is best describes as a(n):
If a penetration test team does not have anything more than a list of IP addresses of the organization's network, what type of test is the penetration tester's conducting?
The law-abiding citizen fallacy
Which hacker fallacy states "writing a virus is not illegal, so it must be OK"?
Which of the following is a common symmetric encryption algorithm?
Which of the following is not one of the key concepts of cryptography?
What is another name for one-time pad?
Which of the following is the least secure because usernames and passwords are transmitted in cleartext?
What is a common physical control that can be used as both a detective and reactive tool?
Half of what you know about security will be obsolete in 18 months
What is G. Mark's Law?
Sets found in the same folder
ITN 261 Midterm
ITN 261 Midterm
ITN 261 FINAL STUDY GUIDE
ITN 261 Final
Sets with similar terms
IFSTA Ch. 3 (FF1)
Chapter 3 *
Other sets by this creator
Threat Management (1.1)
Chapter 1: Introducing Weather and Climate (NAS 12…
Chapter 2: The Earth's Atmosphere (NAS 125)
Other Quizlet sets
CPR test study guide
Life Science Final
Bible EXAM 2 over quiz 3 (ch. 5-6)