Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
Which of the following answers lists an example order of volatility for a typical system? (4 answers) |
Memory dump, temporary files, disk files, archival media |
|
An exact copy of the entire state of a computer system is called: |
System image |
|
In forensic analysis, taking hashes ensures that the collected evidence retains: |
Integrity |
|
Log analysis should not take into account the difference between the reading of a system clock and standard time as this impedes the reconstruction of the sequence of events during an attack or security breach. (True / False) |
False |
|
What acronym refers to any type of information pertaining to an individual that can be used to uniquely identify that person? |
PII |
|
A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies? |
Clean desk policy |
|
Which of the following security controls is used to prevent tailgating? |
Mantraps |
|
What is a zero-day attack exploit: |
Vulnerability that is present in already released software but unknown to the software developer |
|
A system combining heating, ventilating, and air conditioning controls is known as: |
HVAC |
|
EMI shielding protects the data from: (Select 2) |
Outside interference / Eavesdropping |
|
Setting up hot and cold aisles in a server room allows for more efficient management of: |
Air flow |
|
Which of the following answers list examples of physical security control types? (Select 3) |
Biometrics / Motion detection / Video surveillance |
|
Which of the following examples falls into the category of deterrent security control types? |
Lighting |
|
Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select 4) |
RAID / UPS / Hot site / Backup generator |
|
What is the goal of tabletop exercises? |
Disaster recovery planning |
|
Hardware-based RAID Level 0: (Select 2) |
Requires at least two drives to implement / Doesn't offer fault tolerance |
|
Which of the following solutions does not offer fault tolerance? |
RAID 0 |
|
Which of the following answers lists an example method for passive test of security controls? |
Vulnerability scan |
|
Hardware-based RAID Level 1: (Select 2) |
-Requires at least 2 drives to implement (Is also referred to as disk mirroring) -Offers improved reliability by creating identical data sets on each drive (failure of one drive does not destroy the array as each drive contains identical copy of the data) |
|
Hardware-based RAID Level 5: (Select 2) |
-Requires at least 3 drives to implement -Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created from the remaining drives) |
|
What is the function of archive bit? |
Indicating whether a file has been modified since the last backup |
|
What term refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of hard drive failure? |
Drive imaging |
|
In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. (True / False) |
False |
|
Restoring data from an incremental backup requires: (Select 2) |
-Copy of the last full backup -All copies of incremental backups made since the last full backup |
|
A United States federal government initiative aimed at enabling agencies to continue their essential functions across a broad spectrum of emergencies is known as: |
COOP |