• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT ITN 266 CHAP 1 EXAM

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT ITN 266 CHAP 1 EXAM

QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -20 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: If TJX had met the PCI-DSS control objectives, it would have ________ avoided the data breach.

Answer:

probably

Question 2: ________ is a generic term for "evil software."

Answer:

Malware Question 3: Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.

Answer:

False

Question 4: Nonmobile malware can be on webpages that users download.

Answer:

True

Question 5: ________ can spread through e-mail attachments.

Answer:

Both Viruses and Worms

Question 6: In a virus, the code that does damage is called the ________.

Answer:

Payload

Question 7: ________ is the destruction of hardware, software, or data.

Answer:

Sabotage Question 8: Detective countermeasures identify when a threat is attacking and especially when it is succeeding.

Answer:

True

Question 9: Detective countermeasures keep attacks from succeeding.

Answer:

False

Question 10: Which of the following CIA security goals did TJX fail to meet?

Answer:

confidentiality Question 11: You have access to your home page on a server. By accident, you discover that if you hit a certain key, you can get into someone else's files. You spend just a few minutes looking around. This is hacking.

Answer:

True

Question 12: Which of the following can be a type of spyware?

Answer:

Both a cookie and a keystroke logger

Question 13: The fastest propagation occurs with some types of ________.

Answer:

worms

Question 14: Penalties for hacking are ________.

Answer:

irrelevant of the amount stolen

Question 15: Employees are very dangerous because they ________.

Answer:

Both often have access to sensitive parts of the system and are trusted by companies Question 16: Some ________ can jump directly between computers without human intervention.

Answer:

worms

Question 17: Preventative countermeasures keep attacks from succeeding.

Answer:

True

Question 18: Most cookies are dangerous.

Answer:

False Question 19: In fraud, the perpetrator tries to obtain money or other goods by threatening to take actions that would be against the victim's interest.

Answer:

False Question 20: Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.

Answer:

True

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT ITN 266 CHAP 1 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -20 Questions and Answers -format se...

UNLOCK ACCESS $11.99