Question 6

A security administrator suspects an employee has been emailing proprietary information to a competitor. Company policy requires the administrator to capture an exact copy of the employee's hard disk. Which of the following should the administrator use?
  • Question 7

    A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?
  • Question 8

    Which of the following distributes data among nodes, making it more difficult to manipulate the data while also minimizing downtime?
  • Question 9

    A systems analyst is responsible for generating a new digital forensics chain-of-custody form Which of the following should the analyst Include in this documentation? (Select TWO).
  • Question 10

    A security analyst has been asked to investigate a situation after the SOC started to receive alerts from the SIEM. The analyst first looks at the domain controller and finds the following events:

    To better understand what is going on, the analyst runs a command and receives the following output:

    Based on the analyst's findings, which of the following attacks is being executed?