Go Back on SY0-601 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

SY0-601 Practice Test


Page 17 out of 178 Pages

Topic 2: Exam Pool B

A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select
TWO).


A.

The order of volatility


B.

A checksum


C.

The location of the artifacts


D.

The vendor's name


E.

The date and time


F.

A warning bnner





A.
  

The order of volatility



E.
  

The date and time



A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on thecompromised server. Which of the following files should be given to the forensics firm?


A.

Security


B.

Application


C.

Dump


D.

Syslog





A.
  

Security



A company's Chief Information Security Officer (CISO) recently warned the security
manager that the company’s Chief Executive Officer (CEO) is planning to publish a
controversial option article in a national newspaper, which may result in new cyberattacks
Which of the following would be BEST for the security manager to use in a threat mode?


A.

Hacktivists


B.

White-hat hackers


C.

Script kiddies


D.

Insider threats





A.
  

Hacktivists



An employee has been charged with fraud and is suspected of using corporate assets. As authorities collect evidence, and to preserve the admissibility of the evidence, which of the following forensic techniques should be used?


A.

Order of volatility


B.

Data recovery


C.

Chain of custody


D.

Non-repudiation





C.
  

Chain of custody



A company has decided to move its operations to the cloud. It wants to utilize technology
that will prevent users from downloading company applications for personal use, restrict
data that is uploaded, and have visibility into which applications are being used across the
company. Which of the following solutions will BEST meet these requirements?


A.

An NGFW


B.

A CASB


C.

Application whitelisting


D.

An NG-SWG





B.
  

A CASB




Page 17 out of 178 Pages
Previous