An attacker intercepts a hash and compares it to pre-computed hashes to crack a password. Which of the following methods has been used?
What kind of measures and controls are implemented when employees get assigned personal, unique badges when they join the organization, and they remain valid until the employee's last day of work?
While planning a vulnerability assessment on a computer network, which of the following is essential? (Choose two.)
Which of the following is an essential component of a disaster recovery plan?
Which of the following actions should be done by the incident response team after completing the recovery phase of the cyber incident caused by malware?
A Windows system administrator has received notification from a security analyst regarding new malware that executes under the process name of “armageddon.exe†along with a request to audit all department workstations for its presence. In the absence of GUI-based tools, what command could the administrator execute to complete this task?
Which of the following are part of the hardening phase of the vulnerability assessment process? (Choose two.)
The "right to be forgotten" is considered a core tenet of which of the following privacy-focused acts or regulations?