- (Exam Topic 2)
Which of the following is the BEST action to foster a consistent and auditable incident response process?
Correct Answer:
B
- (Exam Topic 6)
A security analyst is using OSINT to gather information to verity whether company data is available publicly. Which of the following is the BEST application for the analyst to use?
Correct Answer:
A
TheHarvester is a reconnaissance tool that is used to gather information about a target organization, such as email addresses, subdomains, and IP addresses. It can also be used to gather information about a target individual, such as email addresses, phone numbers, and social media profiles. TheHarvester is specifically designed for OSINT (Open-Source Intelligence) and it can be used to discover publicly available information about a target organization or individual.
- (Exam Topic 3)
Which of the following is MOST likely to outline the roles and responsibilities of data controllers and data processors?
Correct Answer:
C
- (Exam Topic 4)
Aweb server administrator has redundant servers and needs to ensure failover to the secondary server when the primary server goes down. Which of the following should the administrator implement to avoid disruption?
Correct Answer:
B
- (Exam Topic 3)
An attacker is exploiting a vulnerability that does not have a patch available. Which of the following is the attacker exploiting?
Correct Answer:
A