Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
17-04-2024
Geschreven in
2023/2024

ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS You are required to keep track of file access. Which type of auditing should be implemented? Object Access Object Access This determines attempts to access files and other objects. Process Tracking This determines events such as program activation and process exits. Directory Services This determines whether the operating system generates audit events when an AD DS object is accessed. Audit Logon This determines whether the operating system generates audit events when a user attempts to log on to the computer. You are part of a cyber forensics team that needs to examine a hard drive for evidence. Your supervisor tells you to first make a duplicate of the hard drive. What is the purpose of making a duplicate of the hard drive? To preserve the original state of the hard drive. Surveillance cameras are installed around the building perimeter. Detective control A failed disk is replaced and the backup is restored. Corrective control New biometric door locks are installed. Preventive control Which type of attack is directed toward a specific group of users to trick them into visiting an infected website? Watering hole Targets individuals through phone calls to gather compromising information. Vishing Targets a high-profile victim. Whaling

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ITS Cybersecurity (QUESTIONS WITH 100% CORRECT
ANSWERS
You are required to keep track of file access.
Which type of auditing should be implemented?
Object Access


Object Access
This determines attempts to access files and other objects.


Process Tracking
This determines events such as program activation and process exits.


Directory Services
This determines whether the operating system generates audit events when an AD DS object is
accessed.


Audit Logon
This determines whether the operating system generates audit events when a user attempts to log on
to the computer.


You are part of a cyber forensics team that needs to examine a hard drive for evidence. Your
supervisor tells you to first make a duplicate of the hard drive.
What is the purpose of making a duplicate of the hard drive?
To preserve the original state of the hard drive.


Surveillance cameras are installed around the building perimeter.
Detective control


A failed disk is replaced and the backup is restored.
Corrective control


New biometric door locks are installed.
Preventive control


Which type of attack is directed toward a specific group of users to trick them into visiting an infected
website?
Watering hole


Targets individuals through phone calls to gather compromising information.
Vishing


Targets a high-profile victim.
Whaling

, Instead of luring, it involves directing an internet user to fake websites.
Pharming


Which type of attack occurs when threat actors utilize botnets on several computers to overwhelm a
target web server?
Distributed Denial-of-Service (DDoS)


An attacker has connected a laptop to a wireless network and attempts to lease all available IP
addresses from the DHCP server.
Which type of attack is occuring?
DHCP Starvation


When an attacker responds to client DHCP and sends the client's incorrect IP address information
such as wrong default gateway or DNS server.
DHCP Spoofing


When an attacker alters DNS records to redirect online traffic to a fraudulent website.
DNS Spoofing


When the attacker creates IP packets with a modified source address to impersonate another
computer system.
IP Spoofing


Which option is a common type of attack launched against IoT devices?
DDos attack


What are the two classes of encryption algorithms?
Asymmetric and Symmetric


What are the two most common hashing algorithms.
SHA-2 and MD5


In which phase of the NIST Incident Response Life Cycle do you investigate network intrusion
detection sensor alerts?
Detection & Analysis Phase


In which phase of the NIST Incident Response Life Cycle are you organizing to respond to security
incidents?
Preparation Phase


In which phase of the NIST Incident Response Life Cycle are you actively working on removing the
malicious activity?
Containment, Eradication, and Recovery Phase

Geschreven voor

Vak

Documentinformatie

Geüpload op
17 april 2024
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EXAMSMART Howard Community College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
10
Lid sinds
2 jaar
Aantal volgers
2
Documenten
2992
Laatst verkocht
1 maand geleden
SMART.SCORES

On this page, you find all documents, package deals, and flashcards offered by seller LectJoshua.

5.0

2 beoordelingen

5
2
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen