100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITS Cybersecurity Practice UPDATED ACTUAL Questions and CORRECT Answers $9.99   Add to cart

Exam (elaborations)

ITS Cybersecurity Practice UPDATED ACTUAL Questions and CORRECT Answers

 0 view  0 purchase
  • Course
  • ITS Cybersecurity
  • Institution
  • ITS Cybersecurity

ITS Cybersecurity Practice UPDATED ACTUAL Questions and CORRECT Answers A self-propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial-of-service attack is called a _____. - CORRECT ANSWER- worm A computer malware code...

[Show more]

Preview 3 out of 20  pages

  • October 11, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITS Cybersecurity
  • ITS Cybersecurity
avatar-seller
MGRADES
ITS Cybersecurity Practice UPDATED
ACTUAL Questions and CORRECT
Answers
A self-propagating malicious code that can propagate to other systems on the network and
consume resources that could lead to a denial-of-service attack is called a _____. -
CORRECT ANSWER✔✔- worm


A computer malware code that replicates itself on the target computer and spreads through
the network causing damage and distributing additional harmful payloads is called a _____. -
CORRECT ANSWER✔✔- virus


A program that appears to be useful or harmless but contains hidden code that can
compromise the target system on which it runs is called a _____. - CORRECT
ANSWER✔✔- Trojan horse



What are the two classes of encryption algorithms? (Choose 2.) - CORRECT ANSWER✔✔-
Asymmetric
Symmetric


Which algorithm is a one-way mathematical function that is used to provide data integrity? -
CORRECT ANSWER✔✔- SHA-2


Why is it important to block incoming IP broadcast addresses and reserved private IP
addresses from entering your network? - CORRECT ANSWER✔✔- These types of
addresses are easier to use for IP spoofing attacks.


You are a junior cybersecurity analyst. An employee reports to you that her laptop was stolen.
For which three reasons should you escalate this event to the Computer Security Incident
Response Team (CSIRT)? (Choose 3.) - CORRECT ANSWER✔✔- Potential network
disruption or denial of service
Exposure of sensitive or confidential information
Unauthorized use of resources

,Which classification of alert should be escalated to security investigators? - CORRECT
ANSWER✔✔- True positive


Which term refers to the combined sum of all potential threat vectors in defense-in-depth
security? - CORRECT ANSWER✔✔- Attack surface


You receive an email from your teacher that has a link to a class poll for a pizza party. You
click the link which takes you to the school portal to log in. Later, you discover this was a
phishing email and your credentials were stolen. Which part of the CIA Triad was
compromised in this attack? - CORRECT ANSWER✔✔- Confidentiality


A major power surge occurs in the middle of making authorized changes to the company
payroll server which results in equipment failure. The equipment is replaced and the data is
restored from a previous, good backup. Which part of the CIA Triad was preserved? -
CORRECT ANSWER✔✔- Availability


Which two states of data domains would require encryption and hashing to secure the data?
(Choose 2.) - CORRECT ANSWER✔✔- Data at rest
Data in transit


In which order should you collect digital evidence from a computer system? - CORRECT
ANSWER✔✔- Contents of RAM, Contents of Fixed Disk, Archived Backup


Which type of attack substitutes a source IP address to impersonate a legitimate computer
system? - CORRECT ANSWER✔✔- IP Spoofing


In a DHCP __ attack, threat actors configure a fake DHCP server on the network to issue
DHCP addresses to clients. - CORRECT ANSWER✔✔- spoofing


In a DHCP __ attack, threat actors flood the DHCP server with DHCP requests to use up all
the available IP addresses that the legitimate DHCP server can issue. - CORRECT
ANSWER✔✔- starvation


In a DNS __ attack, threat actors use publicly accessible open DNS servers to flood a target
with DNS response traffic. - CORRECT ANSWER✔✔- amplification

, In a DNS __ attack, threat actors change the A record for your domain's IP address to point to
a predetermined address of their choice. - CORRECT ANSWER✔✔- hijacking


An attacker on the local network is forwarding packets that associate the MAC address of the
attacker's computer with the IP address of a legitimate server. Which type of attack is taking
place? - CORRECT ANSWER✔✔- ARP Spoofing


An attacker has connected a laptop to a wireless network and attempts to lease all available IP
addresses from the DHCP server. Which type of attack is occurring? - CORRECT
ANSWER✔✔- DHCP Starvation


An attacker has overwhelmed a server by sending more GET requests than the server can
process. This results in a successful DoS attack. Which type of attack has occurred? -
CORRECT ANSWER✔✔- HTTP flooding



_____ is used to find vulnerabilities within a computer system. - CORRECT ANSWER✔✔-
Penetration testing


Establish the incident response team.
Determine if an incident has occurred.
Validate the IP address of the attacking host.

Hold a lessons learned meeting. - CORRECT ANSWER✔✔- Preparation Phase
Detection & Analysis Phase
Containment, Eradication, and Recovery Phase
Post-Incident Activity Phase


In which phase of the NIST Incident Response Life Cycle do you investigate network
intrusion detection sensor alerts? - CORRECT ANSWER✔✔- Detection & Analysis Phase


Which compliance act must a hospital located in the U.S. adhere to when investigating
security incidents involving patients' personal medical information? - CORRECT
ANSWER✔✔- HIPAA

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82265 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart