1. A system administrator wants to implement an internal communication system that will allow employees to send encrypted messages to each other. The system must also support non- repudiation. Which of the following implements all these requirements?
A) PGP B) SHA C) Blowfish D) Bcrypt
2. Joe a computer forensic technician responds to an active compromise of a database server. Joe first collects information in memory,then collects network traffic and finally conducts an image of the hard drive. Which of the following procedures did Joe follow?
A) Order of volatility B) Recovery procedure C) Chain of custody D) Incident isolation
3. A systems administrator has been assigned to create accounts for summer interns. The interns are only authorized to be in the facility and operate computers under close supervision. They must also leave the facility at designated times each day. However,the interns can access intern file folders without supervision. Which of the following represents the BEST way to configure the accounts? (Select TWO.)(Select 2answers)
A) Create privileged accounts. B) Implement time-of-day restrictions. C) Access executive shared portals. D) Enforce least privilege. E) Modify archived data.
4. Before an infection was detected,several of the infected devices attempted to access a URL that was similar to the company name but with two letters transposed. Which of the following BEST describes the attack vector used to infect the devices?
A) DNS poisoning B) URL hijacking C) Typo squatting D) Cross-site scripting
5. During a data breach cleanup,it is discovered that not all of the sites involved have the necessary data wiping tools. The necessary tools are quickly distributed to the required technicians,but when should this problem BEST be revisited?
A) Lessons Learned B) Mitigation C) Reporting D) Preparation
Leave a comment