COMPLETE QUESTIONS AND ANSWERS [
GRADED A+]
You are required to keep track of file access.
Which type of auditing should be implemented? - ✔✔Object Access
Object Access - ✔✔This determines attempts to access files and other
objects.
Process Tracking - ✔✔This determines events such as program
activation and process exits.
©morren2024/2025.Year published 2024.
,Directory Services - ✔✔This determines whether the operating system
generates audit events when an AD DS object is accessed.
Audit Logon - ✔✔This determines whether the operating system
generates audit events when a user attempts to log on to the
computer.
You are part of a cyber forensics team that needs to examine a hard
drive for evidence. Your supervisor tells you to first make a duplicate of
the hard drive.
What is the purpose of making a duplicate of the hard drive? - ✔✔To
preserve the original state of the hard drive.
©morren2024/2025.Year published 2024.
, Surveillance cameras are installed around the building perimeter. -
✔✔Detective control
A failed disk is replaced and the backup is restored. - ✔✔Corrective
control
New biometric door locks are installed. - ✔✔Preventive control
Which type of attack is directed toward a specific group of users to trick
them into visiting an infected website? - ✔✔Watering hole
Targets individuals through phone calls to gather compromising
information. - ✔✔Vishing
©morren2024/2025.Year published 2024.