CTI 130 81 Practice Questions Chapter 12

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

based on the info , what should you recommend your client to do to increase security

1.) disable the USB ports user`s work station

defines an employees rights to use company property

acceptable use policy

sets expectations for users privacy when using company resources

acceptable use policy

which of the following is an important aspect of evidence gathering ?

backing up all log files and audit trails

what type of document it this

chain of custody

identifies a set of rules or standards that define personal behviors

code of ethics

when conducting a forensic investigation , and assuming that the attack has been stopped,which of the following actions should you perform first?

document whats on the screen

which security measures can be used to generate and store cryptographic

trusted platform module (tpm)

you have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. you are concerned that someone might walk by and take one of these laptops .which of the following is the best protection to implement to address your concerns

use cable locks to chain the laptops to the desk

you have purchased new computers and will be disposing of your old computers. instead of recycling the computers, you decide to resell them by placing an ad on the internet . these computers were previously used for storing sensitive info .what should you do prior to getting rid of the computers

use data wiping software to clear the hard drives

which are examples of a strong password? (select two.)

1.)TuxP3nguinsRn031 2.)il0ve2eaticeCr3am

Which security practices is an example of the principle of least privilege?

1.)all users on a windows workstation are limited users except for one user who is responsible for maintaining the system.

one of the windows workstations you manage has four users accounts defined on it two of the users are limited users while the third (your account) is an administrative user. the fourth account is the guest user account,which has been enabled to allow management employees convenient workstations access. each limited and administrative user has been assigned a strong password. file and folder permission have been assigned to prevent users from accessing each other`s files. auto run has been disabled on the system. what should you do to increase the security of this system?

1.)disable the guest account

what recommendations would you make to this organization to increase their security?(select two.)

1.)disable the network jacks in the reception area 2.) train the receptionist to keep her ipad in a locked drawer when not in use

Which of the following actions directly improves system security on windows system?(select two.)

1.)enable the windows firewall 2.)install anti-malware software

a user within your organization received an email relating how an account contain a large sum of money has been frozen by the government of a small African nation. the user was offer 25% share of this account if she would help the sender transfer it to the bank in the united states . the user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer .she complied ,and then the sender used the info to drain her bank account what type of attack occurred?

1.)phishing

you provide desktop support at the branch office of a bank.one of the windows workstations you mange is used by a bank employee to set up new customer accounts and fill out customer loan application . each user account on the system has been assigned a strong password .file and loan permissions have been assigned to prevent users from accessing each others files . what else could you do to increase the security of this system?(select two.)

1.)secure the system to the desk with a cable lock. 2.)install a privacy filter on the monitor.

one of the windows workstations you manage has three users accounts defined on it .two of the users are limited users while the third (your account) is an administrative user . each limited and administrative user has bean assigned a strong password .file and folder permissions have been assigned to prevent users from accessing each others files . what else could you do to increase the security of this system?(select two.)

1.)set a screen saver password 2.)disable autorun the system

have you properly prepared these systems for disposal?

no, you should use disk wiping software to fully erase the drives

provides a high-level overview of the organization security program

organizational security policy

specifies that user accounts should be locked after a certain number of failed login attempts

password policy

identifies the requirements for credentials used to authenticate to company -owned systems.

passwords policy

you need to enable a screen saver password on the windows work station in your organization. which control panel option should you use to do this

personilazion

which of the following actions is most likely to destroy critical evedince

rebooting the system

the chain of custody is used for what purpose

retraining evidence integrity by identifying people coming into contact with evidence

a security incident is currently occurring on the company network . you discover that the attack involves a computer system that is attached to the network .you`re not sure yet exactly what kind of damage is being done to the network system or data .what actions should you take first

stop the attack and contain the damage by disconnecting the system from the network


Kaugnay na mga set ng pag-aaral

MIS 140 Chapter 1 Homework questions

View Set

Unit 1 Wk 3- Pain, Fluid & Electrolytes

View Set

MT2 Ch12 Assessing Control Risk and Reporting on Internal Controls

View Set

Unit 1 - Scarcity, Choice, Opportunity Cost

View Set

LearningCurve 3b. Infancy and Childhood

View Set