- (Exam Topic 11)
After a thorough analysis, it was discovered that a perpetrator compromised a network by gaining access to the network through a Secure Socket Layer (SSL) Virtual Private Network (VPN) gateway. The perpetrator guessed a username and brute forced the password to gain access. Which of the following BEST mitigates this issue?
Correct Answer:
D
- (Exam Topic 11)
What is the PRIMARY goal for using Domain Name System Security Extensions (DNSSEC) to sign records?
Correct Answer:
A
- (Exam Topic 13)
A company seizes a mobile device suspected of being used in committing fraud. What would be the BEST method used by a forensic examiner to isolate the powered-on device from the network and preserve the evidence?
Correct Answer:
A
- (Exam Topic 13)
Which of the following is a responsibility of a data steward?
Correct Answer:
A
- (Exam Topic 12)
Which of the following is the BEST method to reduce the effectiveness of phishing attacks?
Correct Answer:
A