Objectives Research and analyze cyber security incidents Background / Scenario Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts predict that these…
Objectives Part 1: Prepare a Personal Computer for Virtualization Part 2: Import a Virtual Machine into VirtualBox Inventory Background / Scenario Computing power and resources have…
A technician notices that an application is not responding to commands and that the computer seems to respond slowly when applications are opened. What is the…
What is the responsibility of the human resources department when handing a security incident as defined by NIST? Review the incident policies, plans, and procedures for…
What are three functions provided by the syslog service? (Choose three.) to provide statistics on packets that are flowing through a Cisco device to select the…
What is a chain of custody? The documentation surrounding the preservation of evidence related to an incident * A list of all of the stakeholders that…
Which term describes evidence that is in its original state? Corroborating evidence Best evidence * Indirect evidence Direct evidence How is the hash value of files…
Which Windows tool can be used to review host logs? Services Event Viewer * Task Manager Device Manager Which two protocols may devices use in the…
Which class of metric in the CVSS Basic metric group defines the features ofthe exploit such as the vector, complexity, and user interaction required by the…