100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS $9.99   Add to cart

Exam (elaborations)

ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS

 5 views  0 purchase
  • Course
  • Institution

ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS You are required to keep track of file access. Which type of auditing should be implemented? Object Access Object Access This determines attempts to access files and other objects. Process Tracking This determines events such as ...

[Show more]

Preview 2 out of 8  pages

  • April 5, 2024
  • 8
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
avatar-seller
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT
ANSWERS
You are required to keep track of file access.
Which type of auditing should be implemented?
Object Access


Object Access
This determines attempts to access files and other objects.


Process Tracking
This determines events such as program activation and process exits.


Directory Services
This determines whether the operating system generates audit events when an AD DS object is
accessed.


Audit Logon
This determines whether the operating system generates audit events when a user attempts to log on
to the computer.


You are part of a cyber forensics team that needs to examine a hard drive for evidence. Your
supervisor tells you to first make a duplicate of the hard drive.
What is the purpose of making a duplicate of the hard drive?
To preserve the original state of the hard drive.


Surveillance cameras are installed around the building perimeter.
Detective control


A failed disk is replaced and the backup is restored.
Corrective control


New biometric door locks are installed.
Preventive control


Which type of attack is directed toward a specific group of users to trick them into visiting an infected
website?
Watering hole


Targets individuals through phone calls to gather compromising information.
Vishing


Targets a high-profile victim.
Whaling

, Instead of luring, it involves directing an internet user to fake websites.
Pharming


Which type of attack occurs when threat actors utilize botnets on several computers to overwhelm a
target web server?
Distributed Denial-of-Service (DDoS)


An attacker has connected a laptop to a wireless network and attempts to lease all available IP
addresses from the DHCP server.
Which type of attack is occuring?
DHCP Starvation


When an attacker responds to client DHCP and sends the client's incorrect IP address information
such as wrong default gateway or DNS server.
DHCP Spoofing


When an attacker alters DNS records to redirect online traffic to a fraudulent website.
DNS Spoofing


When the attacker creates IP packets with a modified source address to impersonate another
computer system.
IP Spoofing


Which option is a common type of attack launched against IoT devices?
DDos attack


What are the two classes of encryption algorithms?
Asymmetric and Symmetric


What are the two most common hashing algorithms.
SHA-2 and MD5


In which phase of the NIST Incident Response Life Cycle do you investigate network intrusion
detection sensor alerts?
Detection & Analysis Phase


In which phase of the NIST Incident Response Life Cycle are you organizing to respond to security
incidents?
Preparation Phase


In which phase of the NIST Incident Response Life Cycle are you actively working on removing the
malicious activity?
Containment, Eradication, and Recovery Phase

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller LectAziim. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81531 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart