Which of the following can be used as a vulnerability management and assessment tool?
During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?
What allows a company to restore normal business operations in a matter of minutes or seconds?
Which concept involves having more than one person required to complete a task?
Detailed step-by-step instructions to follow during a security incident are considered:
A security professional discovers a new ransomware strain that disables antivirus on the endpoint during an
infection. Which location would be the BEST place for the security professional to find technical information about this malware?
Recently, a cybersecurity research lab discovered that there is a hacking group focused on hacking into the computers of financial executives in Company A to sell the exfiltrated information to Company B. Which of the
following threat motives does this MOST likely represent?
Nmap is a tool most commonly used to:
When attempting to determine which system or user is generating excessive web traffic, analysis of which of
the following would provide the BEST results?
A digital forensics investigation requires analysis of a compromised system's physical memory. Which of the following tools should the forensics analyst use to complete this task?