An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?
Correct Answer:B
A commercial cyber-threat intelligence organization observes IoCs across a variety of unrelated customers. Prior to releasing specific threat intelligence to other paid subscribers, the organization is MOST likely obligated by contracts to:
Correct Answer:B
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)
Correct Answer:DE
During a security assessment, a security finds a file with overly permissive permissions. Which of the following tools will allow the analyst to reduce the permission for the existing users and groups and remove the set-user-ID from the file?
Correct Answer:D
The process of passively gathering information prior to launching a cyberattack is called:
Correct Answer:B