In a security governance framework, which of the following publications would be at the HIGHEST level?
Correct Answer:A
Which algorithm is a current specification for the encryption of electronic data established by NIST?
Correct Answer:B
https://www.nist.gov/publications/advanced-encryption-standard-aes
When a digital forensics investigator is conducting art investigation and handling the original data, what KEY principle must they adhere to?
Correct Answer:A
A penetration tester undertaking a port scan of a client's network, discovers a host which responds to requestsonTCP ports 22, 80, 443, 3306and 8080.
What type of device has MOST LIKELY been discovered?
Correct Answer:A
What are the different methods that can be used as access controls?
* 1. Detective.
* 2. Physical.
* 3. Reactive.
* 4. Virtual.
* 5. Preventive.
Correct Answer:C