A nuclear facility manager determined the need to

This preview shows page 20 - 23 out of 29 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Guide To Computer Forensics and Investigations
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 6
Guide To Computer Forensics and Investigations
Nelson/Phillips
Expert Verified
24.A nuclear facility manager determined the need to monitor utilization of water within the facility. A startup company just announced a state-of-the-art solution to address the need for integrating the business and ICS networks. The solution requires a very small agent to be installed on the ICS equipment. Which of the following is the MOST important security control for the manager to invest in to protect the facility? A. Run a penetration test on the installed agent B. Require that the solution provider make the agent source code available for analysis C. Require thorough guides for administrator and users D. Install the agent for a week on a test system and monitor the activities Answer:D
25.A security professional is analyzing the results of a network utilization report. The report includes the following information: Which of the following servers needs further investigation?
26.Due to new regulations, a company has decided to institute an organizational vulnerability management
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Guide To Computer Forensics and Investigations
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 6
Guide To Computer Forensics and Investigations
Nelson/Phillips
Expert Verified
The safer , easier way to help you pass any IT exams.program and assign the function to the security team. Which of the following frameworks would BEST support the program? (Select Two) 20/ 27
27.A cybersecurity analyst has received an alert that well-known "call home" messages are continuously observed by network sensors at the network boundary. The proxy firewall successfully drops the messages. After determining the alert was a true positive, which of the following represents the MOST likely cause?
28.A company has implemented WPA2, a 20-character minimum for the WIFI passphrase, and a new WiFi passphrase every 30 days, and has disabled SSID broadcast on all wireless access points. Which of the following is the company trying to mitigate? A. Downgrade attacks B. Rainbow tables C. SSL pinning D. Forced deauthentication Answer:D
29.The help desk formed a security analyst of a trend that is beginning to develop regarding a suspicious email that has been reported by multiple users. The analyst has determined the email includes an attachment named invoice.zip that contains the following files: Locky.jp xerty.ini xerty.lib Further analysis indicates that when the zip file Is opened, it is installing a new version of ransomware on the devices. Which of the following should be done FIRST to prevent data on the company NAS from being encrypted by infected devices?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture