Question 26

During an investigation, an incident responder intends to recover multiple pieces of digital medi A. Before removing the media, the responder should initiate:
  • Question 27

    A security analyst is investigating a system compromise. The analyst verities the system was up to date on OS patches at the time of the compromise. Which of the following describes the type of vulnerability that was MOST likely expiated?
  • Question 28

    While monitoring the information security notification mailbox, a security analyst notices several emails were repotted as spam. Which of the following should the analyst do FIRST?
  • Question 29

    An organization that uses SPF has been notified emails sent via its authorized third-party partner are getting rejected A security analyst reviews the DNS entry and sees the following:
    v=spf1 ip4:180.10.6.5 ip4:180.10.6.10 include:robustmail.com -all
    The organization's primary mail server IP is 180.10 6.6, and the secondary mail server IP is 180.10.6.5. The organization's third-party mail provider is "Robust Mail" with the domain name robustmail.com.
    Which of the following is the MOST likely reason for the rejected emails?
  • Question 30

    An organization needs to limit its exposure to accidental disclosure when employees send emails that contain personal information to recipients outside the company Which of the following technical controls would BEST accomplish this goal?