As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?

An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?A . Order of volatilityB . Data recoveryC . Chain of custodyD . Non-repudiationView AnswerAnswer: C

November 9, 2021 No Comments READ MORE +

Which of the following should the administrator use?

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee’s hard disk. Which of the following should the administrator use?A . ddB . chmodC . dnsenumD . loggerView AnswerAnswer: A

November 9, 2021 No Comments READ MORE +

Which of the following BEST represents this type of threat?

The IT department at a university is concerned about professors placing servers on the university network in an attempt to bypass security controls. Which of the following BEST represents this type of threat?A . A script kiddieB . Shadow ITC . HacktivismD . White-hatView AnswerAnswer: B Explanation: Shadow IT solutions...

November 9, 2021 No Comments READ MORE +

Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation

HOTSPOT Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation. INSTRUCTIONS Not all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All...

November 8, 2021 No Comments READ MORE +

Which of the following would BEST protect the company from data exfiltration via removable media?

A company has drafted an insider-threat policy that prohibits the use of external storage devices. Which of the following would BEST protect the company from data exfiltration via removable media?A . Monitoring large data transfer transactions in the firewall logsB . Developing mandatory training to educate employees about the removable...

November 8, 2021 No Comments READ MORE +

Which of the following is the BEST solution to protect these designs?

A manufacturer creates designs for very high security products that are required to be protected and controlled by the government regulations. These designs are not accessible by corporate networks or the Internet. Which of the following is the BEST solution to protect these designs?A . An air gapB . A...

November 8, 2021 No Comments READ MORE +

Which of the following methods would BEST accomplish this goal?

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?A . Salting the magnetic strip informationB ....

November 7, 2021 No Comments READ MORE +

Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?

An organization has implemented a policy requiring the use of conductive metal lockboxes for personal electronic devices outside of a secure research lab. Which of the following did the organization determine to be the GREATEST risk to intellectual property when creating this policy?A . The theft of portable electronic devicesB...

November 7, 2021 No Comments READ MORE +

A security engineer is setting up password less authentication for the first time

DRAG DROP A security engineer is setting up password less authentication for the first time. INSTRUCTIONS Use the minimum set of commands to set this up and verify that it works. Commands cannot be reused. If at any time you would like to bring back the initial state of the...

November 7, 2021 No Comments READ MORE +

Which of the following recommendations would BEST prevent this from reoccurring?

A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would...

November 7, 2021 No Comments READ MORE +