February 2023

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Vickie recently gathered digital evidence and would like to be able to provide future users of that evidence with the ability to verify non-repudiation. How can she provide this? A. Generate a hash value from the evidence B. Digitally sign the evidence C. Encrypt the evidence D. Generate a checksum from the evidence Correct Answer: B Using a hash value or checksum can verify that the evidence was not altered, but does not provide non-repudiation. Encrypting the evidence protects it from unauthorized disclosure and also verifies integrity, but it does not provide non-repudiation. Vickie can provide non-repudiation by digitally signing the evidence with her private key.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Beth is using the Cyber Kill Chain approach to analyzing the actions of an intruder on her network. She finds evidence that the most recent activity of the attacker was to successfully use a buffer overflow attack to gain control of a system. What stage is the attacker in? A. Attacker in exploitation B. Weaponization C. Command and Control D. Installation Correct Answer: A The stages of the Cyber Kill Chain are reconnaissance, weaponization, delivery, exploitation, installation, command-and-control, and actions on objectives. The exploitation stage is where the attacker exploits a vulnerability to execute code on the victim's system. That is the stage where a buffer overflow attack gains control of a system. Interested in more practice test questions? Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Alison is preparing to testify in court about the results of a forensic investigation conducted after a security breach. As an expert witness, she will be sharing her interpretation of the evidence collected by others. What type of evidence will Alison be giving? A. Hearsay B. Documentary C. Testimonial D. Tangible Correct Answer: C Expert witness evidence is best described as testimonial evidence, where a witness is making statements about their own observations and experience. The scenario does not specify that Alison will be introducing any documents or tangible objects herself. Hearsay would only apply if Alison makes statements about what other people said to her, which is also not described in the scenario.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...