Which of the following security controls would be applied on individual hosts to monitor suspicious activities, by actively analyzing events occurring within that host,
and blocking any suspicious or abnormal activity?
Jane, a security administrator, forgets his card to access the server room. Jane asks Matt if she could use his card for the day. Which of the following is Jane using
to gain access to the server room?
During a forensic investigation, which of the following information is compared to verify the contents of a hard drive image match the original drive and have not
been changed by the imaging process?
Jane brought a laptop in from home and connected the Ethernet interface on the laptop to a wall jack with a patch cable. Jane was unable to access any network
resources. Which of the following is the MOST likely cause?
Matt, a new employee, installed an application on his workstation that allowed Internet users to have access to his workstation. Which of the following security
related training could have mitigated this action?