- (Exam Topic 6)
What are the common data hiding techniques used by criminals?
Correct Answer:
D
Reference: https://cisomag.eccouncil.org/challenges-and-applications-of-digital-forensics/
- (Exam Topic 5)
A system is designed to dynamically block offending Internet IP-addresses from requesting services from a secure website. This type of control is considered
Correct Answer:
C
- (Exam Topic 5)
SCENARIO: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified.
After determining the audit findings are accurate, which of the following is the MOST logical next activity?
Correct Answer:
A
- (Exam Topic 2)
You have implemented the new controls. What is the next step?
Correct Answer:
B
- (Exam Topic 1)
The alerting, monitoring and life-cycle management of security related events is typically handled by the
Correct Answer:
A