Terms in this set (23)
A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list
below in the correct order in which the forensic analyst should preserve them.
1. CPU cache
4. Hard drive
Unsecured computer lab
Cable lock, proximity badges, biometric, CCTV, safe, cabinet lock
Office work place
safe, proximity, cable lock
biometric, proximity, mantrap, cipher lock
cable lock, mantrap, CCTV
Targeted CEO or Board Member
Attacker gains confidential company infomation
Broad Set of Victims
Attacker post a link to fake AV software
Phone based victims
Attacker collecting credit card details
Broad set of recipients
Attacker mass mails product information to parties that have already opted out of receiving advertisements
Finger print scanner
One time password
Company Manager Smart Phone
1. Screen locks
2. Strong Password
3. Device Encryption
4. Remote Wipe
5. GPS Tracking
6. Pop-up blocker
Data Center Terminal Server
1. Cable locks
3. Host Based Firewall
4. Proximity Reader
6. Man trap
Email sent to multiple users to a link to verify username/password on external site
Phone calls made to CEO of organization asking for various financial data.
Phone call is made to individual stating there was an IT issue, and asked for the users password over the phone.
You're on a social media site and an instant message pops up from friends with a link to a new break through diet.
A friend/colleague ask you questions of a personal nature, which could be considered typical password reset questions.
Something you know, something you have, something you are
YOU MIGHT ALSO LIKE...
SY0-401:4 TS Quiz Application, Data, and Host Security
Mangt 366, Final Exam, Managing IT
NTA Lesson 6 Study Set
OTHER SETS BY THIS CREATOR
Security + Remember This
THIS SET IS OFTEN IN FOLDERS WITH...
Security + Encryption
CompTIA Security +