CTI 130 81 Practice Questions Chapter 12
based on the info , what should you recommend your client to do to increase security
1.) disable the USB ports user`s work station
defines an employees rights to use company property
acceptable use policy
sets expectations for users privacy when using company resources
acceptable use policy
which of the following is an important aspect of evidence gathering ?
backing up all log files and audit trails
what type of document it this
chain of custody
identifies a set of rules or standards that define personal behviors
code of ethics
when conducting a forensic investigation , and assuming that the attack has been stopped,which of the following actions should you perform first?
document whats on the screen
which security measures can be used to generate and store cryptographic
trusted platform module (tpm)
you have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. you are concerned that someone might walk by and take one of these laptops .which of the following is the best protection to implement to address your concerns
use cable locks to chain the laptops to the desk
you have purchased new computers and will be disposing of your old computers. instead of recycling the computers, you decide to resell them by placing an ad on the internet . these computers were previously used for storing sensitive info .what should you do prior to getting rid of the computers
use data wiping software to clear the hard drives
which are examples of a strong password? (select two.)
1.)TuxP3nguinsRn031 2.)il0ve2eaticeCr3am
Which security practices is an example of the principle of least privilege?
1.)all users on a windows workstation are limited users except for one user who is responsible for maintaining the system.
one of the windows workstations you manage has four users accounts defined on it two of the users are limited users while the third (your account) is an administrative user. the fourth account is the guest user account,which has been enabled to allow management employees convenient workstations access. each limited and administrative user has been assigned a strong password. file and folder permission have been assigned to prevent users from accessing each other`s files. auto run has been disabled on the system. what should you do to increase the security of this system?
1.)disable the guest account
what recommendations would you make to this organization to increase their security?(select two.)
1.)disable the network jacks in the reception area 2.) train the receptionist to keep her ipad in a locked drawer when not in use
Which of the following actions directly improves system security on windows system?(select two.)
1.)enable the windows firewall 2.)install anti-malware software
a user within your organization received an email relating how an account contain a large sum of money has been frozen by the government of a small African nation. the user was offer 25% share of this account if she would help the sender transfer it to the bank in the united states . the user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer .she complied ,and then the sender used the info to drain her bank account what type of attack occurred?
1.)phishing
you provide desktop support at the branch office of a bank.one of the windows workstations you mange is used by a bank employee to set up new customer accounts and fill out customer loan application . each user account on the system has been assigned a strong password .file and loan permissions have been assigned to prevent users from accessing each others files . what else could you do to increase the security of this system?(select two.)
1.)secure the system to the desk with a cable lock. 2.)install a privacy filter on the monitor.
one of the windows workstations you manage has three users accounts defined on it .two of the users are limited users while the third (your account) is an administrative user . each limited and administrative user has bean assigned a strong password .file and folder permissions have been assigned to prevent users from accessing each others files . what else could you do to increase the security of this system?(select two.)
1.)set a screen saver password 2.)disable autorun the system
have you properly prepared these systems for disposal?
no, you should use disk wiping software to fully erase the drives
provides a high-level overview of the organization security program
organizational security policy
specifies that user accounts should be locked after a certain number of failed login attempts
password policy
identifies the requirements for credentials used to authenticate to company -owned systems.
passwords policy
you need to enable a screen saver password on the windows work station in your organization. which control panel option should you use to do this
personilazion
which of the following actions is most likely to destroy critical evedince
rebooting the system
the chain of custody is used for what purpose
retraining evidence integrity by identifying people coming into contact with evidence
a security incident is currently occurring on the company network . you discover that the attack involves a computer system that is attached to the network .you`re not sure yet exactly what kind of damage is being done to the network system or data .what actions should you take first
stop the attack and contain the damage by disconnecting the system from the network