1. When performing data acquisition on a workstation,which of the following should be captured based on memory volatility? (Select two.)(Select 2answers)
A) Mounted network storage B) USB-attached hard disk C) Swap/pagefile D) ROM E) RAM
2. Phishing emails frequently take advantage of high-profile catastrophes reported in the news. Which of the following principles BEST describes the weakness being exploited?
A) Intimidation B) Scarcity C) Authority D) Social proof
3. The help desk is receiving numerous password change alerts from users in the accounting department. These alerts occur multiple times on the same day for each of the affected users' accounts. Which of the following controls should be implemented to curtail this activity?
A) Password History B) Password complexity C) Password Reuse D) Password Minimum age
4. When accessing a popular website,a user receives a warming that the certificate for the website is not valid. Upon investigation,it was noted that the certificate is not revoked and the website is working fine for other users. Which of the following is the MOST likely cause for this?
A) The certificate was deleted from the local cache. B) The user needs to restart the machine. C) The certificate is corrupted on the server. D) The system date on the user - s device is out of sync.
5. Which of the following are methods to implement HA in a web application server environment? (Select two.)(Select 2answers)
A) Reverse proxies B) Application layer firewalls C) Routers D) VPN concentrators E) Load balancers
Leave a comment