- (Exam Topic 3)
An analyst is working onan email incident in which target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the BEST course of action for the analyst to take?
Correct Answer:
B
- (Exam Topic 1)
Which of the following control types is focused primarily on reducing risk before an incident occurs?
Correct Answer:
D
- (Exam Topic 5)
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
Correct Answer:
BC
- (Exam Topic 6)
Which of the following BEST describes the method a security analyst would use to confirm a file that is downloaded from a trusted security website is not altered in transit or corrupted using a verified checksum?
Correct Answer:
C
- (Exam Topic 3)
Against the recommendation of the IT security analyst, a company set all user passwords on a server as “P@)55wOrD". Upon review of the /etc/pesswa file,
an attacker found the following:
hich of the following BEST explains why the encrypted passwords do not match?
Correct Answer:
C