Which of the following is the FIRST step in a forensics investigation when a breach of a client’s workstation has been confirmed?
A Chief Executive Officer (CEO) is steering company towards cloud computing. The CEO is requesting a federated sign-on method to have users sign into the sales application. Which of the following methods will be effective for this purpose?
A company researched the root cause of a recent vulnerability in its software. It was determined that the vulnerability was the result of two updates made in the last release. Each update alone would not have resulted in the vulnerability.In order to prevent similar situations in the future, which of the following should the company improve?
A system administrator wants to use open source software but is worried about the source code being comprised. As a part of the download and installation process, the administrator should verify the integrity of the software by:
Ann, a member of the Sales Department, has been issued a company-owned laptop for use when traveling to remote sites.Which of the following would be MOST appropriate when configuring security on her laptop?
An attacker has gained access to the companys web server by using the administrators credentials. The attacker then begins to work on compromising the sensitive data on other servers.Which of the following BEST describes this type of attack?