CSIT 161: FINAL EXAM QUESTIONS AND ANSWERS 100% CORRECT(SCORED A+)
Ricky is reviewing security logs to independently assess security controls. Which security review process is Ricky engaging in? - ANSWER-audit Christopher is designing a security policy for his organization. He would like to use an approach that allows a reasonable list of activities but does not allow other activities. Which permission level is he planning to use? - ANSWER-prudent Jacob is conducting an audit of the security controls at an organization as an independent reviewer. Which question would NOT be part of his audit? - ANSWER-Is the security control likely to become obsolete in the near future? Which regulatory standard would NOT require audits of companies in the United States? - ANSWER-Personal Information Protection and Electronic Documents Act (PIPEDA) Emily is the information security director for a large company that handles sensitive personal information. She is hiring an auditor to conduct an assessment demonstrating that her firm is satisfying requirements regarding customer private data. What type of assessment should she request? - ANSWER-SOC 3 Which item is an auditor least likely to review during a system controls audit? - ANSWER-Resumes of system administrators What is a set of concepts and policies for managing IT infrastructure, development, and operations? - ANSWER-IT Infrastructure Library (ITIL) Which audit data collection method helps ensure that the information-gathering process covers all relevant areas? - ANSWER-Checklist Curtis is conducting an audit of an identity management system. Which question is NOT likely to be in the scope of his audit? - ANSWER-Does the firewall properly block unsolicited network connection attempts? What information should an auditor share with the client during an exit interview? - ANSWER-Details on major issues What is NOT generally a section in an audit report? - ANSWER-system configurations What type of security monitoring tool would be most likely to identify an unauthorized change to a computer system? - ANSWER-System integrity monitoring Gina is preparing to monitor network activity using packet sniffing. Which technology is most likely to interfere with this effort if used on the network? - ANSWER-Secure Sockets Layer (SSL) Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion alert each time that an administrator connects to a server using Secure Shell (SSH). What type of error is occurring? - ANSWER-False positive error Isaac is responsible for performing log reviews for his organization in an attempt to identify security issues. He has a massive amount of data to review. What type of tool would best assist him with this work? - ANSWER-Security information and event management (SIEM) Which intrusion detection system strategy relies upon pattern matching? - ANSWER-Signature detection Which security testing activity uses tools that scan for services running on systems? - ANSWER-Network mapping Fran is conducting a security test of a new application. She does not have any access to the source code or other details of the application she is testing. What type of test is Fran conducting? - ANSWER-Black-box test
Escuela, estudio y materia
- Institución
- CSIT 161:
- Grado
- CSIT 161:
Información del documento
- Subido en
- 3 de noviembre de 2023
- Número de páginas
- 13
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
csit 161 final exam questions and answers 100 co
-
csit 161 final exam stuvia
-
ricky is reviewing security logs to independently
-
christopher is designing a security policy for his
Documento también disponible en un lote