1.
Which of the following refers to the ability to be reasonably certain that data is not modified or tampered with?
2.
Which description is correct about the form used while transferring evidence?
3.
Disguising oneself as a reputable hardware manufacturer's field technician who is picking up a server for repair would be described as:
4.
A graphical user interface (GUI) is a type of user interface which allows people to interact with electronic devices such as computers; hand-held devices such as MP3 Players, Portable Media Players or Gaming devices; household appliances and office equipment. Which of the following will allow a technician to restrict a user accessing to the GUI?
5.
A security specialist has downloaded a free security software tool from a trusted industry site. The source has published the MD5 hash values for the executable program. The specialist performs a successful virus scan on the download but the MD5 hash is different. Which of the following steps should the specialist take?
6.
Which authentication method will prevent a replay attack from occurring?
7.
Which of the following identifies the layer of the OSI model where SSL provides encryption?
8.
Which of the following refers to the ability to be reasonably certain that data is not disclosed to unintended persons?
9.
Which of the following can be used by a technician to detect staff members that are connecting to an unauthorized website?
10.
Which of the following would be the BEST reason to disable unnecessary services on a server?