• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Which of the following answers lists an example order of volatility for a typical system? (4 answers)

Memory dump, temporary files, disk files, archival media

An exact copy of the entire state of a computer system is called:

System image

In forensic analysis, taking hashes ensures that the collected evidence retains:

Integrity

Log analysis should not take into account the difference between the reading of a system clock and standard time as this impedes the reconstruction of the sequence of events during an attack or security breach.


(True / False)

False

What acronym refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

PII

A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies?

Clean desk policy

Which of the following security controls is used to prevent tailgating?

Mantraps

What is a zero-day attack exploit:

Vulnerability that is present in already released software but unknown to the software developer

A system combining heating, ventilating, and air conditioning controls is known as:

HVAC

EMI shielding protects the data from:


(Select 2)

Outside interference / Eavesdropping

Setting up hot and cold aisles in a server room allows for more efficient management of:

Air flow

Which of the following answers list examples of physical security control types?


(Select 3)

Biometrics /


Motion detection / Video surveillance

Which of the following examples falls into the category of deterrent security control types?

Lighting

Which of the following solutions add(s) redundancy in areas identified as single points of failure? (Select 4)

RAID / UPS / Hot site / Backup generator

What is the goal of tabletop exercises?

Disaster recovery planning

Hardware-based RAID Level 0: (Select 2)

Requires at least two drives to implement / Doesn't offer fault tolerance

Which of the following solutions does not offer fault tolerance?

RAID 0

Which of the following answers lists an example method for passive test of security controls?

Vulnerability scan

Hardware-based RAID Level 1:


(Select 2)

-Requires at least 2 drives to implement


(Is also referred to as disk mirroring)




-Offers improved reliability by creating identical data sets on each drive


(failure of one drive does not destroy the array as each drive contains identical copy of the data)

Hardware-based RAID Level 5: (Select 2)

-Requires at least 3 drives to implement




-Offers increased performance and fault tolerance


(single drive failure does not destroy the array and lost data can be re-created from the remaining drives)

What is the function of archive bit?

Indicating whether a file has been modified since the last backup

What term refers to a backup technique that allows for creating an exact copy of an entire drive and replicating the drive to a new computer or to another drive on the same computer in case of hard drive failure?

Drive imaging

In a differential backup strategy, restoring data from backup requires only a working copy of the last full backup. (True / False)

False

Restoring data from an incremental backup requires: (Select 2)

-Copy of the last full backup




-All copies of incremental backups made since the last full backup

A United States federal government initiative aimed at enabling agencies to continue their essential functions across a broad spectrum of emergencies is known as:

COOP