Tara, a certified first responder in a digital forensics team, is dispatched to investigate a suspected insider attack targeting a critical workstation in the finance department. Upon arriving at the scene, she takes a methodical approach: she begins labeling all connected network cables, photographs the back panel of the workstation, documents cable connections, and records the power status of each connected device, including peripherals like external drives and monitors. She also notes the orientation and placement of equipment on the desk and the surrounding environment.
These actions are part of her protocol to ensure that, if the devices need to be moved for forensic analysis, investigators can accurately replicate the system’s physical setup at the time of the incident. What is Tara aiming to achieve with these actions?
Which of the following has been used to evade IDS and IPS?
Which of the following processes is referred to as an approach to respond to the
security incidents that occurred in an organization and enables the response team by
ensuring that they know exactly what process to follow in case of security incidents?
Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used for further investigation of the incident. In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?
Lena, a SOC analyst, observes a pattern of unusual login attempts originating from multiple foreign IP addresses tied to shared drive links circulating within the organization. These links were embedded in emails appearing to come from the HR department and marked with urgent subject lines. Upon deeper inspection, Lena finds multiple similar messages still pending in the mail server’s delivery queue. To prevent widespread exposure, she takes immediate action to eliminate these messages before they reach employees' inboxes. Which incident response action best describes Lena’s action?
Which of the following risk management processes identifies the risks, estimates the impact, and determines sources to recommend proper mitigation measures?
SafePay, an online payment portal, recently introduced an advanced search feature. A week later, users reported unauthorized transactions. Investigation showed attackers exploited advanced search strings and a previously unidentified vulnerability. What is SafePay's best immediate action?
Which of the following terms refers to vulnerable account management functions, including account update, recovery of forgotten or lost passwords, and password reset, that might weaken valid authentication schemes?
A logistics company relying heavily on cloud-based inventory management discovered unauthorized activity initiated by a third-party contractor. The investigation revealed that the contractor's login was reused across multiple departments and lacked any tracking mechanism or role-specific restrictions to limit its scope. What cloud security best practice should be implemented to prevent such violations?
Which of the following encoding techniques replaces unusual ASCII characters with
"%" followed by the character’s two-digit ASCII code expressed in hexadecimal?