Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

** Please with an explanation if possible ** *Please answers all or leave it to another expert* Question #:1 On which of the following is

** Please with an explanation if possible **

*Please answers all or leave it to another expert*

Question #:1

On which of the following is the live acquisition of data for forensic analysis MOST dependent? (Select TWO).

A. Data accessibility

B. Legal hold

C. Cryptographic or hash algorithm

D. Data retention legislation

E. Value and volatility of data

F. Right-to-audit clauses

-------------------------------------------------------------------------------------------------------------

Question #:2

A technician has been asked to document which services are running on each of a collection of 200 servers. Which of the following tools BEST meets this need while minimizing the work required?

A. Nmap

B. Nslookup

C. Netcat

D. Netstat

-------------------------------------------------------------------------------------------------------------

Question #:3

Which of the following explains why a vulnerability scan might return a false positive?

A. The scan is performed at a time of day when the vulnerability does not exist.

B. The test Is performed against the wrong host.

C. The signature matches the product but not the version information.

D. The hosts are evaluated based on an OS-specific profile.

------------------------------------------------------------------------------------------------------------- Question #:4

Which of the following may indicate a configuration item has reached end-of-life?

A. The device will no longer turn on and indicates an error

B. The vendor has not published security patches recently.

C. The object has been removed from the Active Directory.

D. Logs show a performance degradation of the component.

-------------------------------------------------------------------------------------------------------------

Question #:5

A company has purchased a new SaaS application and is in the process of configuring it to meet the companys needs. The director of security has requested that the SaaS application be integrated into the companys IAM processes. Which of the following configurations should the security administrator set up in order to complete this request?

A. LDAP

B. RADIUS

C. SAML

D. NTLM

------------------------------------------------------------------------------------------------------------- Question #:6

A highly complex password policy has made it nearly impossible to crack account passwords. Which of the following might a hacker still be able to perform?

A. Pass-the-hash attack

B. ARP poisoning attack

C. Birthday attack

D. Brute-force attack

-------------------------------------------------------------------------------------------------------------

Question #:7

In highly secure environments where the risk of malicious actors attempting to steal data is high, which of the following is the BEST reason to deploy Faraday cages?

A. To provide emanation control to prevent credential harvesting

B. To minimize signal attenuation over distances to maximize signal strength

C. To minimize external RF interference with embedded processors

D. To protect the integrity of audit logs from malicious alteration

------------------------------------------------------------------------------------------------------------- Question #:8

Which of the following Impacts are associated with vulnerabilities in embedded systems? (Select TWO).

A. Repeated exploitation due to unpatchtable firmware

B. Denial of service due to an integrated legacy operating system

C. Loss of inventory accountability due to device deployment

D. Key reuse and collision Issues due to decentralized management

E. Exhaustion of network resources resulting from poor NIC management

------------------------------------------------------------------------------------------------------------- Question #:9

A company has a team of penetration testers. This team has located a file on the company file server that they believe contains cleartext usernames followed by a hash. Which of the following tools should the penetration testers use to learn more about the content of this file?

A. Exploitation framework

B. Vulnerability scanner

C. Netcat

D. Password cracker

------------------------------------------------------------------------------------------------------------- Question #:10

Which of the following algorithms would be used to provide non-repudiation of a file transmission?

A. AES

B. RSA

C. MD5

D. SHA

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database In Depth Relational Theory For Practitioners

Authors: C.J. Date

1st Edition

0596100124, 978-0596100124

More Books

Students also viewed these Databases questions

Question

2. What role should job descriptions play in training at Apex?

Answered: 1 week ago