<< Prev Question Next Question >>

Question 27/104

An analyst needs to identify the applications a user was running and the files that were open before the user's computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (104q)
1 commentQuestion 1: A user recently entered a username and password into a recru...
Question 2: A network administrator has been alerted that web pages are ...
Question 3: Which of the following cloud models provides clients with se...
Question 4: When selecting a technical solution for identity management,...
Question 5: A vulnerability assessment report will include the CVSS scor...
Question 6: A company's bank has reported that multiple corporate credit...
Question 7: A security analyst needs to complete an assessment. The anal...
Question 8: A company uses wireless tor all laptops and keeps a very det...
Question 9: During a routine scan of a wireless segment at a retail comp...
Question 10: A security analyst is reviewing a new website that will soon...
Question 11: A security analyst discovers several .jpg photos from a cell...
Question 12: After entering a username and password, and administrator mu...
Question 13: A security analyst is reviewing information regarding recent...
Question 14: A user reports constant lag and performance issues with the ...
Question 15: A security analyst is reviewing logs on a server and observe...
Question 16: An analyst has determined that a server was not patched and ...
Question 17: A critical file server is being upgraded and the systems adm...
Question 18: In which of the following situations would it be BEST to use...
Question 19: A user recently attended an exposition and received some dig...
Question 20: An organization's Chief Security Officer (CSO) wants to vali...
Question 21: An engineer wants to access sensitive data from a corporate-...
Question 22: An organization suffered an outage and a critical system too...
Question 23: To reduce costs and overhead, an organization wants to move ...
Question 24: After a ransomware attack a forensics company needs to revie...
Question 25: A company recently experienced an attack in which a maliciou...
Question 26: Which of the following describes the BEST approach for deplo...
Question 27: An analyst needs to identify the applications a user was run...
Question 28: An organization needs to implement more stringent controls o...
Question 29: A company has decided to move its operations to the cloud. I...
Question 30: A company is designing the layout of a new datacenter so it ...
Question 31: Which of the following disaster recovery tests is The LEAST ...
Question 32: Which of the following would be BEST to establish between or...
Question 33: During an incident response, a security analyst observes the...
Question 34: An employee has been charged with fraud and is suspected of ...
Question 35: The manager who is responsible for a data set has asked a se...
Question 36: Select the appropriate attack and remediation from each drop...
Question 37: Which of the following would be the BEST resource lor a soft...
Question 38: A network administrator needs to build out a new datacenter,...
Question 39: Which of the following should be put in place when negotiati...
Question 40: An end user reports a computer has been acting slower than n...
Question 41: A network engineer notices the VPN concentrator overloaded a...
Question 42: Which of the following relets to applications and systems th...
Question 43: Joe. a security analyst, recently performed a network discov...
Question 44: A security analyst discovers that a company username and pas...
Question 45: An attacker is trying to gain access by installing malware o...
Question 46: The cost of 'Cmovable media and the security risks of transp...
Question 47: A financial analyst is expecting an email containing sensiti...
Question 48: An attacker was easily able to log in to a company's securit...
Question 49: A smart retail business has a local store and a newly establ...
Question 50: An organization blocks user access to command-line interpret...
Question 51: An attacker has successfully exfiltrated several non-salted ...
Question 52: Users at organization have been installing programs from the...
Question 53: A network engineer has been asked to investigate why several...
Question 54: A company has been experiencing very brief power outages fro...
Question 55: An organization is developing a plan in the event of a compl...
Question 56: A company has drafted an insider-threat policy that prohibit...
Question 57: A systems administrator needs to install a new wireless netw...
Question 58: Which of the following algorithms has the SMALLEST key size?...
Question 59: A Chief Information Security Officer (CISO) needs to create ...
Question 60: Which of the following BEST explains the difference between ...
Question 61: An organization's help desk is flooded with phone calls from...
Question 62: A user is concerned that a web application will not be able ...
Question 63: A database administrator needs to ensure all passwords are s...
Question 64: An organization has decided to host its web application and ...
Question 65: Which of the following incident response steps involves acti...
Question 66: Which of the following is MOST likely to outline the roles a...
Question 67: A startup company is using multiple SaaS and IaaS platform t...
Question 68: After a phishing scam for a user's credentials, the red team...
Question 69: A user recent an SMS on a mobile phone that asked for bank d...
Question 70: An incident response technician collected a mobile device du...
Question 71: An organization has implemented a policy requiring the use o...
Question 72: A nuclear plant was the victim of a recent attack, and all t...
Question 73: Users have been issued smart cards that provide physical acc...
Question 74: An organization with a low tolerance for user inconvenience ...
Question 75: A company's Chief Information Office (CIO) is meeting with t...
Question 76: A recently discovered zero-day exploit utilizes an unknown v...
Question 77: A security engineer is setting up passwordless authenticatio...
Question 78: Joe, a user at a company, clicked an email link led to a web...
Question 79: A security analyst needs to determine how an attacker was ab...
Question 80: The website http://companywebsite.com requires users to prov...
Question 81: A document that appears to be malicious has been discovered ...
Question 82: A security analyst is logged into a Windows file server and ...
Question 83: A privileged user at a company stole several proprietary doc...
Question 84: Which of the following is the BEST reason to maintain a func...
Question 85: A software developer needs to perform code-execution testing...
Question 86: A security analyst notices several attacks are being blocked...
Question 87: An attacked is attempting to exploit users by creating a fak...
Question 88: A RAT that was used to compromise an organization's banking ...
Question 89: A security analyst is running a vulnerability scan to check ...
Question 90: An attacker was easily able to log in to a company's securit...
Question 91: A smart switch has the ability to monitor electrical levels ...
Question 92: A SOC is implementing an in sider-threat-detection program. ...
Question 93: A company's Chief Information Security Officer (CISO) recent...
Question 94: A retail executive recently accepted a job with a major comp...
Question 95: Which of the following scenarios would make a DNS sinkhole e...
Question 96: A security modern may have occurred on the desktop PC of an ...
Question 97: Which of the following environments minimizes end-user disru...
Question 98: Which of the following are requirements that must be configu...
Question 99: A financial organization has adopted a new secure, encrypted...
Question 100: A technician needs to prevent data loss in a laboratory. The...
Question 101: To secure an application after a large data breach, an e-com...
Question 102: A manufacturer creates designs for very high security produc...
Question 103: An organization has a growing workforce that is mostly drive...
Question 104: A external forensics investigator has been hired to investig...