Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITS Cybersecurity Practice Exam (QUESTIONS WITH 100% CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A+
Geüpload op
05-04-2024
Geschreven in
2023/2024

ITS Cybersecurity Practice Exam (QUESTIONS WITH 100% CORRECT ANSWERS A self-propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial-of-service attack is called a _____. worm A computer malware code that replicates itself on the target computer and spreads through the network causing damage and distributing additional harmful payloads is called a _____. virus A program that appears to be useful or harmless but contains hidden code that can compromise the target system on which it runs is called a _____. Trojan horse What are the two classes of encryption algorithms? (Choose 2.) Asymmetric Symmetric Which algorithm is a one-way mathematical function that is used to provide data integrity? SHA-2 Why is it important to block incoming IP broadcast addresses and reserved private IP addresses from entering your network? These types of addresses are easier to use for IP spoofing attacks. You are a junior cybersecurity analyst. An employee reports to you that her laptop was stolen. For which three reasons should you escalate this event to the Computer Security Incident Response Team (CSIRT)? (Choose 3.) Potential network disruption or denial of service Exposure of sensitive or confidential information Unauthorized use of resources Which classification of alert should be escalated to security investigators? True positive Which term refers to the combined sum of all potential threat vectors in defense-in-depth security? Attack surface You receive an email from your teacher that has a link to a class poll for a pizza party. You click the link which takes you to the school portal to log in. Later, you discover this was a phishing email and your credentials were stolen. Which part of the CIA Triad was compromised in this attack? Confidentiality

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ITS Cybersecurity Practice Exam (QUESTIONS
WITH 100% CORRECT ANSWERS
A self-propagating malicious code that can propagate to other systems on the network and consume
resources that could lead to a denial-of-service attack is called a _____.
worm


A computer malware code that replicates itself on the target computer and spreads through the
network causing damage and distributing additional harmful payloads is called a _____.
virus


A program that appears to be useful or harmless but contains hidden code that can compromise the
target system on which it runs is called a _____.
Trojan horse


What are the two classes of encryption algorithms? (Choose 2.)
Asymmetric
Symmetric


Which algorithm is a one-way mathematical function that is used to provide data integrity?
SHA-2


Why is it important to block incoming IP broadcast addresses and reserved private IP addresses from
entering your network?
These types of addresses are easier to use for IP spoofing attacks.


You are a junior cybersecurity analyst. An employee reports to you that her laptop was stolen. For
which three reasons should you escalate this event to the Computer Security Incident Response Team
(CSIRT)? (Choose 3.)
Potential network disruption or denial of service
Exposure of sensitive or confidential information
Unauthorized use of resources


Which classification of alert should be escalated to security investigators?
True positive


Which term refers to the combined sum of all potential threat vectors in defense-in-depth security?
Attack surface


You receive an email from your teacher that has a link to a class poll for a pizza party. You click the
link which takes you to the school portal to log in. Later, you discover this was a phishing email and
your credentials were stolen. Which part of the CIA Triad was compromised in this attack?
Confidentiality


A major power surge occurs in the middle of making authorized changes to the company payroll
server which results in equipment failure. The equipment is replaced and the data is restored from a
previous, good backup. Which part of the CIA Triad was preserved?

, Availability


Which two states of data domains would require encryption and hashing to secure the data? (Choose
2.)
Data at rest
Data in transit


In which order should you collect digital evidence from a computer system?
Contents of RAM, Contents of Fixed Disk, Archived Backup


Which type of attack substitutes a source IP address to impersonate a legitimate computer system?
IP Spoofing


In a DHCP __ attack, threat actors configure a fake DHCP server on the network to issue DHCP
addresses to clients.
spoofing


In a DHCP __ attack, threat actors flood the DHCP server with DHCP requests to use up all the
available IP addresses that the legitimate DHCP server can issue.
starvation


In a DNS __ attack, threat actors use publicly accessible open DNS servers to flood a target with DNS
response traffic.
amplification


In a DNS __ attack, threat actors change the A record for your domain's IP address to point to a
predetermined address of their choice.
hijacking


An attacker on the local network is forwarding packets that associate the MAC address of the
attacker's computer with the IP address of a legitimate server. Which type of attack is taking place?
ARP Spoofing


An attacker has connected a laptop to a wireless network and attempts to lease all available IP
addresses from the DHCP server. Which type of attack is occurring?
DHCP Starvation


An attacker has overwhelmed a server by sending more GET requests than the server can process.
This results in a successful DoS attack. Which type of attack has occurred?
HTTP flooding


_____ is used to find vulnerabilities within a computer system.
Penetration testing


Establish the incident response team.

Geschreven voor

Vak

Documentinformatie

Geüpload op
5 april 2024
Aantal pagina's
15
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectDeniz Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4965
Laatst verkocht
7 maanden geleden
Lect Deniz Academic Resources Hub

Lect Deniz is a highly experienced academic tutor and dedicated content creator with a strong track record of developing comprehensive, high-quality study materials for a wide range of university courses across the globe. With years of experience in higher education support, he excels at transforming complex academic concepts into clear, structured, and easy-to-follow resources that enhance student understanding and confidence. He provides an extensive collection of well-researched and carefully organized documents across key disciplines, including nursing, medicine, and various science fields. His materials cover essential topics such as anatomy, physiology, pharmacology, clinical practice, and core scientific principles, making them highly valuable for both coursework and intensive exam preparation. Each document is thoughtfully designed to align with university standards and curricula, ensuring accuracy, relevance, and practical application. Lect Aziim’s work stands out for its clarity, depth, and attention to detail, offering students concise summaries, detailed explanations, and exam-focused content that supports effective revision. His commitment to academic excellence and student success is reflected in the consistency and reliability of his materials, making him a trusted resource for learners seeking to improve performance and achieve their academic goals.

Lees meer Lees minder
5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen