Topic 2: Exam Pool B
A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select
TWO).
A.
The order of volatility
B.
A checksum
C.
The location of the artifacts
D.
The vendor's name
E.
The date and time
F.
A warning bnner
The order of volatility
The date and time
A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on thecompromised server. Which of the following files should be given to the forensics firm?
A.
Security
B.
Application
C.
Dump
D.
Syslog
Security
A company's Chief Information Security Officer (CISO) recently warned the security
manager that the company’s Chief Executive Officer (CEO) is planning to publish a
controversial option article in a national newspaper, which may result in new cyberattacks
Which of the following would be BEST for the security manager to use in a threat mode?
A.
Hacktivists
B.
White-hat hackers
C.
Script kiddies
D.
Insider threats
Hacktivists
An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?
A.
Order of volatility
B.
Data recovery
C.
Chain of custody
D.
Non-repudiation
Chain of custody
A company has decided to move its operations to the cloud. It wants to utilize technology
that will prevent users from downloading company applications for personal use, restrict
data that is uploaded, and have visibility into which applications are being used across the
company. Which of the following solutions will BEST meet these requirements?
A.
An NGFW
B.
A CASB
C.
Application whitelisting
D.
An NG-SWG
A CASB
Page 17 out of 178 Pages |
Previous |