Which of the following data sources could provide indication of a system compromise involving the exfiltration of data to an unauthorized destination?
Which encryption technology was built into Mac OS X?
FileVault is the encryption technology built into Mac OS X (and later macOS). It provides full disk encryption to protect data by encrypting the entire disk using XTS-AES-128 encryption with a 256-bit key.
Which two answer options are the BEST reasons to conduct post-incident reviews after an incident occurs in an organization? (Choose two.)
To help identify lessons learned and follow-up action: Post-incident reviews are critical for analyzing what went well and what could be improved, allowing the organization to apply lessons learned to future incidents.
To help prevent an incident recurrence: The review process helps identify weaknesses or gaps in the security posture, leading to actions that can prevent similar incidents from happening again in the future.
Various logs are collected for a data leakage case to make a forensic analysis. Which of the following are
MOST important for log integrity? (Choose two.)
Which of the following can increase an attack surface?
Old or unused code can increase an attack surface because it may contain vulnerabilities that have not been addressed or patched. Attackers can exploit these vulnerabilities, especially if the code is not actively maintained or monitored.
Vanna
27 days agoTalia
2 months agoKattie
3 months agoLawrence
3 months agoColette
4 months agoDewitt
4 months agoElise
5 months agoRex
5 months agoKimbery
5 months agoPenney
6 months agoLoise
6 months agoNatalie
6 months agoMatthew
7 months agoAndra
7 months agoElfriede
7 months agoCecilia
8 months agoGearldine
8 months agoKallie
8 months agoJerry
9 months agoDenise
9 months agoGail
10 months agoJosefa
10 months agoPaz
11 months agoMaurine
11 months agoCherelle
11 months agoEdelmira
11 months ago