100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

ITS CYBERSECURITY REVIEW WITH COMPLETE QUESTIONS AND ANSWERS [ GRADED A+]

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
01-01-2025
Written in
2024/2025

ITS CYBERSECURITY REVIEW WITH COMPLETE QUESTIONS AND ANSWERS [ GRADED A+] You are required to keep track of file access. Which type of auditing should be implemented? - Object Access Object Access - This determines attempts to access files and other objects. Process Tracking - This determines events such as program activation and process exits. ©morren2024/2025.Year published 2024. Directory Services - This determines whether the operating system generates audit events when an AD DS object is accessed. Audit Logon - This determines whether the operating system generates audit events when a user attempts to log on to the computer. You are part of a cyber forensics team that needs to examine a hard drive for evidence. Your supervisor tells you to first make a duplicate of the hard drive. What is the purpose of making a duplicate of the hard drive? - To preserve the original state of the hard drive. ©morren2024/2025.Year published 2024.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
January 1, 2025
Number of pages
23
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITS CYBERSECURITY REVIEW WITH

COMPLETE QUESTIONS AND ANSWERS [

GRADED A+]




You are required to keep track of file access.


Which type of auditing should be implemented? - ✔✔Object Access




Object Access - ✔✔This determines attempts to access files and other

objects.




Process Tracking - ✔✔This determines events such as program

activation and process exits.


©morren2024/2025.Year published 2024.

,Directory Services - ✔✔This determines whether the operating system

generates audit events when an AD DS object is accessed.




Audit Logon - ✔✔This determines whether the operating system

generates audit events when a user attempts to log on to the

computer.




You are part of a cyber forensics team that needs to examine a hard

drive for evidence. Your supervisor tells you to first make a duplicate of

the hard drive.


What is the purpose of making a duplicate of the hard drive? - ✔✔To

preserve the original state of the hard drive.




©morren2024/2025.Year published 2024.

, Surveillance cameras are installed around the building perimeter. -

✔✔Detective control




A failed disk is replaced and the backup is restored. - ✔✔Corrective

control




New biometric door locks are installed. - ✔✔Preventive control




Which type of attack is directed toward a specific group of users to trick

them into visiting an infected website? - ✔✔Watering hole




Targets individuals through phone calls to gather compromising

information. - ✔✔Vishing




©morren2024/2025.Year published 2024.
$10.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
morren

Get to know the seller

Seller avatar
morren Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
3 year
Number of followers
2
Documents
1269
Last sold
1 year ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions