Objectives
Research and analyze cyber security incidents
Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and…
Objectives
Part 1: Prepare a Personal Computer for Virtualization
Part 2: Import a Virtual Machine into VirtualBox Inventory
Background / Scenario
Computing power and…
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the best administrative…
What is the responsibility of the human resources department when handing a security incident as defined by NIST?
Review the incident policies, plans, and procedures for…
What are three functions provided by the syslog service? (Choose three.)
to provide statistics on packets that are flowing through a Cisco device
to select the type of…
What is a chain of custody?
The documentation surrounding the preservation of evidence related to an incident *
A list of all of the stakeholders that were exploited by an…
Which term describes evidence that is in its original state?
Corroborating evidence
Best evidence *
Indirect evidence
Direct evidence
How is the hash value of files…
Which Windows tool can be used to review host logs?
Services
Event Viewer *
Task Manager
Device Manager
Which two protocols may devices use in the application…
Which class of metric in the CVSS Basic metric group defines the features ofthe exploit such as the vector, complexity, and user interaction required by the exploit?
Impact…