Jack works as an investigating officer in Private Corporate Investigation Agency Services. He
wants to save an evidence, that he collected from the location where an incident happened, for
future use so that he can have that information whenever needed. Which is the most volatile
memory he can use to save the collected evidence? correct answers CPU cache
Which choice best describes Bluetooth? correct answers A method of data synchronization
between devices
Authorization for multiple applications using one set of credentials is best described by which of
the following? correct answers Single Sign-on
How is separation of duties typically implemented? correct answers Segment administrative
tasks into compartments, and then assign one or more distinct administrators into each
compartment.
When considering a disaster which of the following is not a commonly accepted definition?
correct answers An occurrence that is outside the normal functional baselines
A type of wireless network attack monitors wireless signals for clients making requests to
connect to wireless base stations. It then takes the details from those requests to spoof the
identity of the requested base station in order to fool the client devices into connecting to the
false version of their trusted network. Which attack is this describing? correct answers Evil twin
How does mandatory access control determine which objects a subject can access? correct
answers Through the use of classification labels
Which of the following is NOT a method by which devices are assigned to VLAN network
segments? correct answers Transport-layer port assignment
Which of the following best describes the time that it takes to register with a biometric system,
by providing samples of a personal characteristic? correct answers Enrollment time
, How can a company ensure protection against eavesdropping and session hijacking for its
workers connecting to a public cloud? correct answers Use a VPN.
Which type of client-side program always runs in a sandbox? correct answers Java applet
When hashing a message, which of the following security goals is being provided? correct
answers Integrity
How does a typical SIEM or systems management console retrieve event details from a source
system? correct answers SNMP
A company is concerned about unauthorized entities attacking their wireless network. The
company has chosen to disable SSID broadcast in order to hide their base station and prevent
unauthorized connections. Which of the following statements are correct of this scenario? correct
answers It does not resolve the issue because the SSID is still present in most other management
frames.
Which of the following is true about biometric scan technology? correct answers A number of
points extracted from the item scanned are stored.
A business asset is best described by which of the following? correct answers Competitive
advantage, capability, credibility, or goodwill
Which term is used to indicate the function of access control or defining which subjects can
perform various tasks on specific objects? correct answers Authorization
Other than implementing preventative measures and planning out response and recovery
strategies, what is another important element that will help minimize data loss in the event of a
harmful event that would trigger a disaster recovery policy (DRP)? correct answers Prior
warning of impending harm