00:00

QUESTION 101

- (Exam Topic 6)
What are the common data hiding techniques used by criminals?

Correct Answer: D
Reference: https://cisomag.eccouncil.org/challenges-and-applications-of-digital-forensics/

QUESTION 102

- (Exam Topic 5)
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered

Correct Answer: C

QUESTION 103

- (Exam Topic 5)
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?

Correct Answer: A

QUESTION 104

- (Exam Topic 2)
You have implemented the new controls. What is the next step?

Correct Answer: B

QUESTION 105

- (Exam Topic 1)
The alerting, monitoring and life-cycle management of security related events is typically handled by the

Correct Answer: A