Question 49

A security analyst received an email with the following key: Xj3XJ3LLc
A second security analyst received an email with following key: 3XJ3xjcLLC
The security manager has informed the two analysts that the email they received is a key that allows access to the company’s financial segment for maintenance. This is an example of:

Correct Answer:A

Question 50

A security analyst at a technology solutions firm has uncovered the same vulnerabilities on a vulnerability scan for a long period of time. The vulnerabilities are on systems that are dedicated to the firm's largest client. Which of the following is MOST likely inhibiting the remediation efforts?

Correct Answer:D

Question 51

During an investigation, an incident responder intends to recover multiple pieces of digital media. Before removing the media, the responder should initiate:

Correct Answer:C

START CS0-002 EXAM