To further secure a company’s email system, an administrator is adding public keys to DNS records in the company’s domain Which of the following is being used?
Correct Answer:D
A document that appears to be malicious has been discovered in an email that was sent to a company's Chief Financial Officer (CFO). Which of the following would be BEST to allow a security analyst to gather information and confirm it is a malicious document without executing any code it may contain?
Correct Answer:D
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?
Correct Answer:C
A malicious actor recently penetration a company’s network and moved laterally to the datacenter. Upon investigation, a forensics firm wants to know was in the memory on the compromised server. Which of the following files should be given to the forensics firm?
Correct Answer:C
Which of the following should a data owner require all personnel to sign to legally protect intellectual property?
Correct Answer:D