751-775 Flashcards

1
Q

Which of the following is a reason why a forensic specialist would create a plan to preserve data after an incident and prioritize the sequence for performing forensic analysis?

A. Order of volatility
B. Preservation of event logs
C. Chain of custody
D. Compliance with legal hold

A

B. Preservation of event logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In which of the following scenarios is tokenization the best privacy technique to use?

A. Providing pseudo-anonymization for social media user accounts
B. Serving as a second factor for authentication requests
C. Enabling established customers to safely store credit card information
D. Masking personal information inside databases by segmenting data

A

C. Enabling established customers to safely store credit card information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A new vulnerability enables a type of malware that allows the unauthorized movement of data from a system. Which of the following would detect this behavior?

A. Implementing encryption
B. Monitoring outbound traffic
C. Using default settings
D. Closing all open ports

A

B. Monitoring outbound traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A systems administrator is auditing all company servers to ensure they meet the minimum security baseline. While auditing a Linux server, the systems administrator observes the /etc/shadow file has permissions beyond the baseline recommendation. Which of the following commands should the systems administrator use to resolve this issue?

A. chmod
B. grep
C. dd
D. passwd

A

A. chmod

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security team received the following requirements for a new BYOD program that will allow employees to use personal smartphones to access business email:

  • Sensitive customer data must be safeguarded.
  • Documents from managed sources should not be opened in unmanaged destinations.
  • Sharing of managed documents must be disabled.
  • Employees should not be able to download emailed images to their devices.
  • Personal photos and contact lists must be kept private.
  • IT must be able to remove data from lost/stolen devices or when an employee no longer works for the company.

Which of the following are the best features to enable to meet these requirements? (Choose two.)

A. Remote wipe
B. VPN connection
C. Biometric authentication
D. Device location tracking
E. Geofencing
F. Application approve list
G. Containerization

A

A. Remote wipe
G. Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly