Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may need to be strengthened:
- Which of the following outlines how forensics techniques can be integrated into an IRP?
A. NIST SP 800-66
B. NIST SP 800-65
C. NIST SP 800-85
D. NIST SP 800-86
- According to VERIS, which of the following is not an element under Incident Description?
A. Authentication
B. Attributes
C. Assets
D. Actors
- Which stage of the Cyber Kill Chain involves a hacker dropping a USB flash drive with a malicious payload into the lobby of an organization?
A. Actions on objectives
B. Delivery
C. Reconnaissance
D. Exploitation
- Which of the following is an example of PHI?
A. Telephone number
B. Email address
C. SSN
D. All of the above
- Which of the following is the most volatile data source?
A. A routing table
B. Registers and cache
C. Data on disk drives
D. Temporary filesystems