Question 61

Which of the following is a benefit of using steganalysis techniques in forensic response?
  • Question 62

    The Chief information Officer (CIO) of a large bank, which uses multiple third-party organizations to deliver a service, is concerned about the handling and security of customer data by the parties. Which of the following should be implemented to BEST manage the risk?
  • Question 63

    A financial services company wants to migrate its email services from on-premises servers to a cloud-based email solution. The Chief information Security Officer (CISO) must brief board of directors on the potential security concerns related to this migration. The board is concerned about the following.
    * Transactions being required by unauthorized individual
    * Complete discretion regarding client names, account numbers, and investment information.
    * Malicious attacker using email to distribute malware and ransom ware.
    * Exfiltration of sensitivity company information.
    The cloud-based email solution will provide an6-malware, reputation-based scanning, signature-based scanning, and sandboxing. Which of the following is the BEST option to resolve the board's concerns for this email migration?
  • Question 64

    A host on a company's network has been infected by a worm that appears to be spreading via SMB. A security analyst has been tasked with containing the incident while also maintaining evidence for a subsequent investigation and malware analysis.
    Which of the following steps would be best to perform FIRST?
  • Question 65

    A shipping company that is trying to eliminate entire classes of threats is developing an SELinux policy to ensure its custom Android devices are used exclusively for package tracking.
    After compiling and implementing the policy, in which of the following modes must the company ensure the devices are configured to run?