Question 1

During an investigation, a security manager receives notification from local authorities mat company proprietary data was found on a former employees home computer, The former employee's corporate workstation has since been repurposed, and the data on the hard drive has been overwritten Which of the following would BEST provide the security manager with enough details to determine when the data was removed from the company network?
  • Question 2

    The Chief Financial Officer (CFO) of an insurance company received an email from Ann, the company's Chief Executive Officer (CEO), requesting a transfer of $10,000 to an account. The email states Ann is on vacation and has lost her purse, containing cash and credit cards. Which of the following social-engineering techniques is the attacker using?
  • Question 3

    An analyst visits an internet forum looking for information about a tool. The analyst finds a threat that appears to contain relevant information. One of the posts says the following:

    Which of the following BEST describes the attack that was attempted against the forum readers?
  • Question 4

    After entering a username and password, and administrator must gesture on a touch screen. Which of the following demonstrates what the administrator is providing?
  • Question 5

    After segmenting the network, the network manager wants to control the traffic between the segments. Which of the following should the manager use to control the network traffic?