Question 81

An incident response technician collected a mobile device during an investigation. Which of the following should the technician do to maintain chain of custody?
  • Question 82

    An analyst is generating a security report for the management team. Security guidelines recommend disabling all listening unencrypted services. Given this output from Nmap.

    Which of the following should the analyst recommend to disable?
  • Question 83

    Given the following logs:

    Which of the following BEST describes the type of attack that is occurring?
  • Question 84

    A small business just recovered from a ransomware attack against its file servers by purchasing the decryption keys from the attackers. The issue was triggered by a phishing email and the IT administrator wants to ensure it does not happen again. Which of the following should the IT administrator do FIRST after recovery?
  • Question 85

    Which of the following controls would BEST identify and report malicious insider activities?