Question 321

During a security event investigation, a junior analyst fails to create an image of a server's hard drive before removing the drive and sending it to the forensics analyst. Later, the evidence from the analysis is not usable in the prosecution of the attackers due to the uncertainty of tampering. Which of the following should the junior analyst have followed?
  • Question 322

    A security architect is implementing security measures in response to an external audit that found vulnerabilities in the corporate collaboration tool suite. The report identified the lack of any mechanism to provide confidentiality for electronic correspondence between users and between users and group mailboxes. Which of the following controls would BEST mitigate the identified vulnerability?
  • Question 323

    A team is at the beginning stages of designing a new enterprise-wide application. The new application will have a large database and require a capital investment in hardware. The Chief Information Officer (СIO) has directed the team to save money and reduce the reliance on the datacenter, and the vendor must specialize in hosting large databases in the cloud. Which of the following cloud-hosting options would BEST meet these needs?
  • Question 324

    A security analyst is troubleshooting a scenario in which an operator should only be allowed to reboot
    remote hosts but not perform other activities. The analyst inspects the following portions of different
    configuration files:
    Configuration file 1:
    Operator ALL=/sbin/reboot
    Configuration file 2:
    Command="/sbin/shutdown now", no-x11-forwarding, no-pty, ssh-dss
    Configuration file 3:
    Operator:x:1000:1000::/home/operator:/bin/bash
    Which of the following explains why an intended operator cannot perform the intended action?
  • Question 325

    A Chief Information Security Officer (CISO is reviewing and revising system configuration and hardening guides that were developed internally and have been used several years to secure the organization's systems.
    The CISO knows improvements can be made to the guides.
    Which of the following would be the BEST source of reference during the revision process?