Which of the following, when exposed together, constitutes PII? (Choose two.)
Organizations considered “covered entities†are required to adhere to which compliance requirement?
During the forensic analysis of a compromised computer image, the investigator found that critical files are missing, caches have been cleared, and the history and event log files are empty. According to this scenario, which of the following techniques is the suspect using?
Which of the following describes United States federal government cybersecurity policies and guidelines?
A Linux administrator is trying to determine the character count on many log files. Which of the following command and flag combinations should the administrator use?
A company help desk is flooded with calls regarding systems experiencing slow performance and certain Internet sites taking a long time to load or not loading at all. The security operations center (SOC) analysts who receive these calls take the following actions:
-Running antivirus scans on the affected user machines
-Checking department membership of affected users
-Checking the host-based intrusion prevention system (HIPS) console for affected user machine alerts
-Checking network monitoring tools for anomalous activities
Which of the following phases of the incident response process match the actions taken?
When performing a vulnerability assessment from outside the perimeter, which of the following network devices is MOST likely to skew the scan results?
A security administrator is investigating a compromised host. Which of the following commands could the investigator use to display executing processes in real time?