ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS
5 views 0 purchase
Course
Cyber security
Institution
Cyber Security
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS
You are required to keep track of file access.
Which type of auditing should be implemented?
Object Access
Object Access
This determines attempts to access files and other objects.
Process Tracking
This determines events such as ...
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT
ANSWERS
You are required to keep track of file access.
Which type of auditing should be implemented?
Object Access
Object Access
This determines attempts to access files and other objects.
Process Tracking
This determines events such as program activation and process exits.
Directory Services
This determines whether the operating system generates audit events when an AD DS object is
accessed.
Audit Logon
This determines whether the operating system generates audit events when a user attempts to log on
to the computer.
You are part of a cyber forensics team that needs to examine a hard drive for evidence. Your
supervisor tells you to first make a duplicate of the hard drive.
What is the purpose of making a duplicate of the hard drive?
To preserve the original state of the hard drive.
Surveillance cameras are installed around the building perimeter.
Detective control
A failed disk is replaced and the backup is restored.
Corrective control
New biometric door locks are installed.
Preventive control
Which type of attack is directed toward a specific group of users to trick them into visiting an infected
website?
Watering hole
Targets individuals through phone calls to gather compromising information.
Vishing
Targets a high-profile victim.
Whaling
, Instead of luring, it involves directing an internet user to fake websites.
Pharming
Which type of attack occurs when threat actors utilize botnets on several computers to overwhelm a
target web server?
Distributed Denial-of-Service (DDoS)
An attacker has connected a laptop to a wireless network and attempts to lease all available IP
addresses from the DHCP server.
Which type of attack is occuring?
DHCP Starvation
When an attacker responds to client DHCP and sends the client's incorrect IP address information
such as wrong default gateway or DNS server.
DHCP Spoofing
When an attacker alters DNS records to redirect online traffic to a fraudulent website.
DNS Spoofing
When the attacker creates IP packets with a modified source address to impersonate another
computer system.
IP Spoofing
Which option is a common type of attack launched against IoT devices?
DDos attack
What are the two classes of encryption algorithms?
Asymmetric and Symmetric
What are the two most common hashing algorithms.
SHA-2 and MD5
In which phase of the NIST Incident Response Life Cycle do you investigate network intrusion
detection sensor alerts?
Detection & Analysis Phase
In which phase of the NIST Incident Response Life Cycle are you organizing to respond to security
incidents?
Preparation Phase
In which phase of the NIST Incident Response Life Cycle are you actively working on removing the
malicious activity?
Containment, Eradication, and Recovery Phase
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LectAziim. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.