When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)

When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)A . USB-attached hard diskB . Swap/pagefileC . Mounted network storageD . ROME . RAMView AnswerAnswer: A,D

October 28, 2018 No Comments READ MORE +

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?

A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A . DMZB . NATC . VPND . PATView AnswerAnswer: C

October 17, 2018 No Comments READ MORE +

Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?

Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?A . Error handling to protect against program exploitationB . Exception handling to protect against XSRF attacks.C . Input validation to protect against SQL injection.D . Padding to protect against string buffer...

October 11, 2018 No Comments READ MORE +

Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)

Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)A . Password expirationB . Password lengthC . Password complexityD . Password historyE . Password lockoutView AnswerAnswer: A,D

October 8, 2018 No Comments READ MORE +

Which of the following should the administrator implement to meet the above requirements?

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: Which of the following should the administrator implement to meet the above requirements? (Select three.)A . Eliminate shared accounts.B . Create a...

October 6, 2018 No Comments READ MORE +

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?

Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...

September 30, 2018 No Comments READ MORE +

Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Select two.)

Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Select two.)A . Verify the certificate has not expired on the server.B . Ensure the certificate has a...

September 16, 2018 No Comments READ MORE +

A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring?

A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from...

September 10, 2018 No Comments READ MORE +

A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?

A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?A . Transferring the riskB . Accepting the riskC . Avoiding the...

September 9, 2018 No Comments READ MORE +

A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?

A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?A . PFXB...

August 30, 2018 No Comments READ MORE +