<< Prev Question Next Question >>

Question 73/200

A member of a digital forensics team, Joe arrives at a crime scene and is preparing to collect system dat a. Before powering the system off, Joe knows that he must collect the most volatile date first. Which of the following is the correct order in which Joe should collect the data?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (200q)
Question 1: An in-house penetration tester is using a packet capture dev...
Question 2: During an application design, the development team specifics...
Question 3: A manager suspects that an IT employee with elevated databas...
Question 4: Which of the following are used to increase the computing ti...
Question 5: Which of the following are the MAIN reasons why a systems ad...
Question 6: A vulnerability scanner that uses its running service's acce...
Question 7: A Chief Information Officer (CIO) drafts an agreement betwee...
Question 8: During a third-party audit, it is determined that a member o...
Question 9: An in-house penetration tester has been asked to evade a new...
Question 10: A wireless network uses a RADIUS server that is connected to...
Question 11: Which of the following use the SSH protocol?...
Question 12: Joe, a salesman, was assigned to a new project that requires...
Question 13: Which of the following components of printers and MFDs are M...
Question 14: Joe, a technician, is working remotely with his company prov...
Question 15: As part of a new industry regulation, companies are required...
Question 16: A company is developing a new secure technology and requires...
Question 17: An organization's internal auditor discovers that large sums...
Question 18: Which of the following is the BEST way for home users to mit...
Question 19: A penetration tester is conducting an assessment on Comptia....
Question 20: An administrator is configuring access to information locate...
Question 21: A consultant has been tasked to assess a client's network. T...
Question 22: A systems administrator is reviewing the following informati...
Question 23: A copy of a highly confidential salary report was recently f...
Question 24: Which of the following types of penetration test will allow ...
Question 25: A security administrator is given the security and availabil...
Question 26: A datacenter manager has been asked to prioritize critical s...
Question 27: To help prevent one job role from having sufficient access t...
Question 28: Ann, a user, states that her machine has been behaving errat...
Question 29: An attack that is using interference as its main attack to i...
1 commentQuestion 30: A company's loss control department identifies theft as a re...
Question 31: A user has attempted to access data at a higher classificati...
Question 32: When trying to log onto a company's new ticketing system, so...
Question 33: Despite having implemented password policies, users continue...
Question 34: A security administrator is trying to eradicate a worm, whic...
Question 35: A company has three divisions, each with its own networks an...
Question 36: Joe, a security administrator, needs to extend the organizat...
Question 37: Malware that changes its binary pattern on specific dates at...
Question 38: An incident responder receives a call from a user who report...
Question 39: A forensic expert is given a hard drive from a crime scene a...
Question 40: A security analyst is diagnosing an incident in which a syst...
Question 41: New magnetic locks were ordered for an entire building. In a...
Question 42: A security administrator receives notice that a third-party ...
Question 43: A security analyst receives an alert from a WAF with the fol...
Question 44: Attackers have been using revoked certificates for MITM atta...
Question 45: The help desk received a call after hours from an employee w...
Question 46: Which of the following must be intact for evidence to be adm...
Question 47: A security analyst observes the following events in the logs...
Question 48: A technician is investigating a potentially compromised devi...
Question 49: A security analyst is hardening a web server, which should a...
Question 50: A procedure differs from a policy in that it:...
Question 51: An information system owner has supplied a new requirement t...
Question 52: A user of the wireless network is unable to gain access to t...
Question 53: A highly complex password policy has made it nearly impossib...
Question 54: An attacker uses a network sniffer to capture the packets of...
Question 55: A security analyst is reviewing patches on servers. One of t...
Question 56: Systems administrator and key support staff come together to...
Question 57: A user typically works remotely over the holidays using a we...
Question 58: The Chief Security Officer (CISO) at a multinational banking...
Question 59: Which of the following can be used to control specific comma...
Question 60: A security analyst is mitigating a pass-the-hash vulnerabili...
Question 61: Two users must encrypt and transmit large amounts of data be...
Question 62: Users are attempting to access a company's website but are t...
Question 63: Which of the following is the LEAST secure hashing algorithm...
Question 64: While working on an incident, Joe, a technician, finished re...
Question 65: A security administrator wants to implement strong security ...
Question 66: Which of the following would a security specialist be able t...
Question 67: A security administrator receives an alert from a third-part...
Question 68: The chief Security Officer (CSO) has reported a rise in data...
Question 69: An application was recently compromised after some malformed...
Question 70: A security analyst is performing a quantitative risk analysi...
Question 71: A security analyst is hardening a web server, which should a...
Question 72: A security analyst is reviewing the following packet capture...
Question 73: A member of a digital forensics team, Joe arrives at a crime...
Question 74: A company offers SaaS, maintaining all customers' credential...
Question 75: Which of the following is the main difference an XSS vulnera...
Question 76: An organization needs to implement a large PKI. Network engi...
Question 77: A network administrator needs to allocate a new network for ...
Question 78: A network administrator wants to ensure that users do not co...
Question 79: A security analyst accesses corporate web pages and inputs r...
Question 80: A security administrator returning from a short vacation rec...
Question 81: Which of the following attack types is being carried out whe...
Question 82: Company A agrees to provide perimeter protection, power, and...
Question 83: A systems administrator wants to protect data stored on mobi...
Question 84: A security administrator is reviewing the following network ...
Question 85: After a routine audit, a company discovers that engineering ...
Question 86: A security analyst reviews the following output: (Exhibit) T...
Question 87: A computer on a company network was infected with a zero-day...
Question 88: Which of the following should a security analyst perform FIR...
Question 89: After a security incident, management is meeting with involv...
Question 90: A security administrator wants to implement a logon script t...
Question 91: A company is using a mobile device deployment model in which...
Question 92: A senior incident response manager receives a call about som...
Question 93: A web developer improves client access to the company's REST...
Question 94: A number of employees report that parts of an ERP applicatio...
Question 95: A company was recently audited by a third party. The audit r...
Question 96: After attempting to harden a web server, a security analyst ...
Question 97: Task: Configure the firewall (fill out the table) to allow t...
Question 98: A director of IR is reviewing a report regarding several rec...
Question 99: A user clicked an email link that led to a website than infe...
Question 100: A web server, which is configured to use TLS with AES-GCM-25...
Question 101: A security administrator wants to implement a company-wide p...
Question 102: A company has noticed multiple instances of proprietary info...
Question 103: A security engineer must install the same x.509 certificate ...
Question 104: Recently several employees were victims of a phishing email ...
Question 105: Which of the following BEST describes an important security ...
Question 106: Technicians working with servers hosted at the company's dat...
Question 107: Following the successful response to a data-leakage incident...
Question 108: A bank requires tellers to get manager approval when a custo...
Question 109: When generating a request for a new x.509 certificate for se...
Question 110: A security administrator suspects that data on a server has ...
Question 111: Which of the following threats has sufficient knowledge to c...
Question 112: The availability of a system has been labeled as the highest...
Question 113: A security administrator installed a new network scanner tha...
Question 114: After a user reports stow computer performance, a systems ad...
Question 115: A security manager is creating an account management policy ...
Question 116: Which of the following types of attacks precedes the install...
Question 117: An information security specialist is reviewing the followin...
Question 118: An employer requires that employees use a key-generating app...
Question 119: A Chief Executive Officer (CEO) suspects someone in the lab ...
Question 120: For each of the given items, select the appropriate authenti...
Question 121: A security engineer is configuring a wireless network that m...
Question 122: A computer emergency response team is called at midnight to ...
Question 123: A security analyst is securing smartphones and laptops for a...
Question 124: Users report the following message appears when browsing to ...
Question 125: A security analyst is working on a project that requires the...
Question 126: To determine the ALE of a particular risk, which of the foll...
Question 127: A portable data storage device has been determined to have m...
Question 128: Which of the following security controls does an iris scanne...
Question 129: A product manager is concerned about continuing operations a...
Question 130: A chief Financial Officer (CFO) has asked the Chief Informat...
Question 131: An instructor is teaching a hands-on wireless security class...
Question 132: An administrator is testing the collision resistance of diff...
Question 133: An organization plans to implement multifactor authenticatio...
Question 134: A security analyst is reviewing an assessment report that in...
Question 135: A group of developers is collaborating to write software for...
Question 136: Ann, a customer, is reporting that several important files a...
Question 137: You have just received some room and WiFi access control rec...
Question 138: As part of a new BYOD rollout, a security analyst has been a...
Question 139: A security analyst is investigating a potential breach. Upon...
Question 140: Joe a website administrator believes he owns the intellectua...
Question 141: A user receives an email from ISP indicating malicious traff...
Question 142: User from two organizations, each with its own PKI, need to ...
Question 143: Which of the following best describes the initial processing...
Question 144: A security analyst has set up a network tap to monitor netwo...
Question 145: A company's user lockout policy is enabled after five unsucc...
Question 146: In terms of encrypting data, which of the following is BEST ...
Question 147: Which of the following techniques can be bypass a user or co...
Question 148: A help desk is troubleshooting user reports that the corpora...
Question 149: A security analyst captures forensic evidence from a potenti...
Question 150: An organization has determined it can tolerate a maximum of ...
Question 151: Due to regulatory requirements, a security analyst must impl...
Question 152: The Chief Technology Officer (CTO) of a company, Ann, is put...
Question 153: Which of the following is commonly done as part of a vulnera...
Question 154: Which of the following differentiates a collision attack fro...
Question 155: A company wants to host a publicly available server that per...
Question 156: The firewall administrator is adding a new certificate for t...
Question 157: An actor downloads and runs a program against a corporate lo...
Question 158: A small company's Chief Executive Officer (CEO) has asked it...
Question 159: An administrator has configured a new Linux server with the ...
Question 160: During a routine audit, it is discovered that someone has be...
Question 161: The IT department is deploying new computers. To ease the tr...
Question 162: A remote user (User1) is unable to reach a newly provisioned...
Question 163: After a merger between two companies a security analyst has ...
Question 164: A technician receives a device with the following anomalies:...
Question 165: When performing data acquisition on a workstation, which of ...
Question 166: A security administrator needs to implement a system that de...
Question 167: A software development company needs to share information be...
Question 168: In determining when it may be necessary to perform a credent...
Question 169: A server administrator needs to administer a server remotely...
Question 170: A security technician has been receiving alerts from several...
Question 171: A company's AUP requires: Passwords must meet complexity req...
Question 172: Which of the following are MOST susceptible to birthday atta...
Question 173: A technician suspects that a system has been compromised. Th...
Question 174: A manager wants to distribute a report to several other mana...
Question 175: A security analyst wants to harden the company's VoIP PBX. T...
Question 176: An attacker compromises a public CA and issues unauthorized ...
Question 177: An attacker captures the encrypted communication between two...
Question 178: A call center company wants to implement a domain policy pri...
Question 179: A security architect has convened a meeting to discuss an or...
Question 180: A Chief Information Officer (CIO) recently saw on the news t...
Question 181: Which of the following are methods to implement HA in a web ...
Question 182: A systems administrator wants to implement a wireless protoc...
Question 183: Ann, a user, reports she is unable to access an application ...
Question 184: Ann, a security administrator, has been instructed to perfor...
Question 185: Which of the following methods minimizes the system interact...
Question 186: A penetration tester finds that a company's login credential...
Question 187: A network operations manager has added a second row of serve...
Question 188: A technician is configuring a wireless guest network. After ...
Question 189: A security administrator suspects that a DDoS attack is affe...
Question 190: A new intern in the purchasing department requires read acce...
Question 191: An organization is using a tool to perform a source code rev...
Question 192: An organization's primary datacenter is experiencing a two-d...
Question 193: A company is investigating a data compromise where data exfi...
Question 194: A security analyst is hardening an authentication server. On...
Question 195: A security analyst notices anomalous activity coming from se...
Question 196: A Chief Information Security Officer (CISO) has tasked a sec...
Question 197: A security technician would like to obscure sensitive data w...
Question 198: A company has a data classification system with definitions ...
Question 199: A system administrator wants to provide balance between the ...
Question 200: Which of the following types of keys is found in a key escro...