- All Exams Instant Download
When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)
When performing data acquisition on a workstation, which of the following should be captured based on memory volatility? (Select two.)A . USB-attached hard diskB . Swap/pagefileC . Mounted network storageD . ROME . RAMView AnswerAnswer: A,D
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?
A network administrator wants to implement a method of securing internal routing. Which of the following should the administrator implement?A . DMZB . NATC . VPND . PATView AnswerAnswer: C
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?
Which of the following best describes routine in which semicolons, dashes, quotes, and commas are removed from a string?A . Error handling to protect against program exploitationB . Exception handling to protect against XSRF attacks.C . Input validation to protect against SQL injection.D . Padding to protect against string buffer...
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)
Despite having implemented password policies, users continue to set the same weak passwords and reuse old passwords. Which of the following technical controls would help prevent these policy violations? (Select two.)A . Password expirationB . Password lengthC . Password complexityD . Password historyE . Password lockoutView AnswerAnswer: A,D
Which of the following should the administrator implement to meet the above requirements?
A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: Which of the following should the administrator implement to meet the above requirements? (Select three.)A . Eliminate shared accounts.B . Create a...
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?
Which of the following explains why vendors publish MD5 values when they provide software patches for their customers to download over the Internet?A . The recipient can verify integrity of the software patch.B . The recipient can verify the authenticity of the site used to download the patch.C . The...
Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Select two.)
Users report the following message appears when browsing to the company’s secure site: This website cannot be trusted. Which of the following actions should a security analyst take to resolve these messages? (Select two.)A . Verify the certificate has not expired on the server.B . Ensure the certificate has a...
A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from occurring?
A department head at a university resigned on the first day of the spring semester. It was subsequently determined that the department head deleted numerous files and directories from the server-based home directory while the campus was closed. Which of the following policies or procedures could have prevented this from...
A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?
A company determines that it is prohibitively expensive to become compliant with new credit card regulations. Instead, the company decides to purchase insurance to cover the cost of any potential loss. Which of the following is the company doing?A . Transferring the riskB . Accepting the riskC . Avoiding the...
A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?
A security engineer is configuring a system that requires the X.509 certificate information to be pasted into a form field in Base64 encoded format to import it into the system. Which of the following certificate formats should the engineer use to obtain the information in the required format?A . PFXB...