Free II0-001 Exam Braindumps (page: 25)

Page 24 of 58

An effective counter measure to prevent unauthorized viewing of sensitive data is to:

  1. Provide security classifications on all security subjects
  2. Install a packet analyzer to monitor traffic patterns with a watch for malicious activity
  3. Encrypt data with strong encryption techniques
  4. Honey pots with falsified sensitive data

Answer(s): C



All of the following systems can be compromised by a malicious entity utilizing existing, commonly found and easily obtained, utilities except:

  1. BIOS password crackers
  2. Triple DES encryption decipher
  3. MS Security Accounts Manager password cracker
  4. Screen saver password cracker

Answer(s): B



An area of discovery that may be utilized during an audit may be:

  1. System error logs
  2. Company secret data files
  3. Company confidential data files
  4. Public data files

Answer(s): A



A subject machine may have evidence in the clipboard if

  1. The Pagefile has not been enlarged
  2. The clipboard feature is active
  3. The machine has not been restarted
  4. Clipboard cache is dynamic and therefore is NOT categorized as evidence.

Answer(s): C






Post your Comments and Discuss IISFA II0-001 exam with other Community members:

II0-001 Discussions & Posts