100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITSY 2300 Final Exam Review Operating System Security Questions And Answers $9.99   Add to cart

Exam (elaborations)

ITSY 2300 Final Exam Review Operating System Security Questions And Answers

 0 view  0 purchase
  • Course
  • ITSY 2300
  • Institution
  • ITSY 2300

ITSY 2300 Final Exam Review Operating System Security Questions And Answers Which of the following could be classified as a detective control? ANS video camera / cctv Harvesting emails addresses would occur at what stage of the Lockheed Martin Cyber Kill Chain? ANS Reconnaissance What stag...

[Show more]

Preview 1 out of 2  pages

  • August 27, 2024
  • 2
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • itsy 2300 final exam
  • ITSY 2300
  • ITSY 2300
avatar-seller
Labtech
ITSY 2300 Final Exam Review Operating System Security
Questions And Answers
Which of the following could be classified as a detective control? ANS video camera / cctv



Harvesting emails addresses would occur at what stage of the Lockheed Martin Cyber Kill Chain? ANS
Reconnaissance



What stage of the Lockheed Martin Cyber Kill Chain would a threat actor install create points of persistence by
adding services, AutoRun keys, etc. ANS Installation



Which of the following is true about operating systems? ANS Operating system kernels provide core services,
calling external programs to provide many more operating system services.



Which of the following describes the best balance between providing necessary access for authorized subjects and
denying unnecessary access? ANS The Principal of Least Privilege



Which of the following is an algorithm that uses the same key to Encrypt and Decrypt data? ANS Symmetric
Algorithm



What term is defined as any exposure to a threat? ANS Risk



Which of the following refers to the amount of time it should take for an organization to recover a resource and
bring it back to normal function? ANS Recovery Time Objective (RTO)



Which of the following Entities is most directly responsible to ensure the security of an organization's assets?
ANS Management



Which LAN device commonly has the ability to filter network traffic to block suspicious packets or messages?
ANS Firewall



A Policy is an example of Directive Control. ANS True



A Security Guard is an example of Technical Control. ANS False

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Labtech. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

83750 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart