Which of the following is the best reason for obtaining file hashes from a confiscated laptop?
File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.
During a recent breach, an attacker was able to get a user's login credentials by cracking a password that was retrieved via a stolen laptop. The attacker accessed the hashed passwords from the hard drive when it was connected to another device. Which of the following security measures could have helped prevent this account from being compromised?
Full Disk Encryption ensures that the data on the laptop is encrypted at rest, preventing unauthorized access even if the device is stolen and its hard drive accessed externally. This aligns with CASP+ objective 3.5, which emphasizes implementing encryption to protect sensitive data against theft and compromise.
A recent audit discovered that multiple employees had been using their badges to walk through the secured data center to get to the employee break room. Most of the employees were given access during a previous project, but the access was not removed in a timely manner when the project was complete. Which of the following would reduce the likelihood of this scenario occurring again?
Implementing an automated quarterly attestation process ensures that access is reviewed and approved regularly. This prevents unauthorized or unnecessary access from persisting over time, aligning with CASP+ objective 1.6, which emphasizes continuous access control monitoring.
Which of the following is the best reason for obtaining file hashes from a confiscated laptop?
File hashing is used to create a digital fingerprint of files to detect unauthorized changes. By comparing the hash values before and after analysis, the integrity of the files can be validated. This aligns with CASP+ objective 5.2, which includes forensic evidence integrity and validation methods.
In support of disaster recovery objectives, a third party agreed to provide 99.999% uptime. Recently, a hardware failure impacted a firewall without service degradation. Which of the following resiliency concepts was most likely in place?
High availability ensures continuous operation despite hardware failures by leveraging redundant components like clustered firewalls or failover systems. This aligns with CASP+ objective 3.1, which focuses on implementing availability and redundancy mechanisms in disaster recovery planning.
________________________________________
Melissia
11 days agoBernadine
12 days agoArdella
24 days agoRicki
1 months agoTresa
1 months agoNorah
2 months agoRegenia
2 months agoGary
2 months agoClorinda
2 months agoViva
2 months agoSerina
3 months agoTresa
3 months agoHubert
3 months agoGlynda
3 months agoMaryann
3 months agoFabiola
4 months agoShalon
4 months agoKathrine
4 months agoCorinne
4 months agoLeonie
4 months agoHyun
5 months agoRamonita
5 months agoLai
5 months agoGlenna
5 months agoRolf
5 months agoTwanna
6 months agoLelia
6 months agoKeva
6 months agoErasmo
7 months agoAmie
8 months agoMike
8 months agoJody
8 months agoOdelia
8 months ago