Question 11

A dumpster diver was able 10 retrieve hard drives from a competitor's trash bin. After installing the and hard drives and running common date recovery software. Sensitive information was recovered. In which of the following ways did the competitor apply media sanitation?
  • Question 12

    A network administrator has been alerted that web pages are experiencing long load times. After determining it is not a routing or DNS issue the administrator logs m to the router, runs a command, and receives the following output.

    Which of the following is the router experiencing?
  • Question 13

    When a malicious user is able to retrieve sensitive information from RAM, the programmer has failed a implement:
  • Question 14

    A network administrator was concerned during an audit that users were able to use the same password the day after a password change policy took effect. The following settings are in place:
    Which of the following settings would prevent users from able to immediately reuse the same passwords?
  • Question 15

    An attacker has gathered information about a company employee by obtaining publicly available information from the Internet and social networks. Which of the following types of activity is the attacker performing?