Question 11
A dumpster diver was able 10 retrieve hard drives from a competitor's trash bin. After installing the and hard drives and running common date recovery software. Sensitive information was recovered. In which of the following ways did the competitor apply media sanitation?
Question 12
A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue the administrator logs m to the router, runs a command, and receives the following output.

Which of the following is the router experiencing?

Which of the following is the router experiencing?
Question 13
When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:
Question 14
A network administrator was concerned during an audit that users were able to use the same password the day after a password change policy took effect. The following settings are in place:
Which of the following settings would prevent users from able to immediately reuse the same passwords?
Which of the following settings would prevent users from able to immediately reuse the same passwords?
Question 15
An attacker has gathered information about a company employee by obtaining publicly available information from the Internet and social networks. Which of the following types of activity is the attacker performing?