October 2023

Article

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Tom is a forensic analyst conducting a security investigation at his company after the firm experienced a data breach. He is planning to speak with some employees to gather evidence and suspects they may have been complicit in the breach. Which one of the following statements is incorrect about these conversations? A. Tom may not speak with employees without first advising them of their rights because he suspects they were involved in a security incident B. Interviews should be friendly and non-aggressive C. Tom may ask employees difficult questions during the interview D. Tom should consult Human Resources before speaking with employee who may have been involved in the incident Correct Answer:A One of the keys to answering this question is understanding the difference between interviews and interrogations. In an interview, Tom may ask difficult questions, but should do so in a non-confrontational manner. If Tom gets more aggressive, he crosses the line from interview to interrogation. Tom should always consult with Human Resources before involving employees in an investigation, but he does not need to advise employees of their rights because he is not a law enforcement officer. So, that is the correct answer to this question.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. Which one of the following fields would NOT be found in a NetFlow record? A. Payload B. Source Address C. Destination Address D. Timestamp Correct Answer: A Think of NetFlow as similar to a telephone bill. You get a record of communications, but not the actual communications themselves. So, source address, destination address, and timestamp are included in those records and are not the correct answer to this question, where we’re looking for something that is NOT included in NetFlow logs. NetFlow records only contain summary information about network connections. They do not contain the actual content, or payload, from the connection. So, payload is the correct answer here.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...

Preparing for your next security certification exam? After trying your hand at this practice test question, join the FREE CertMike Study Group for the CISSP, Security+, CySA+, PenTest+, CISM+ or SSCP certification to receive new questions each week. You’ll also receive free access to my customized study strategies. In order to improve the security of his network, Tony is placing systems onto small subnets that are designed for systems that share a common purpose. What term best describes this technique? A. Isolation B. Segmentation C. Refactoring D. Shimming Correct Answer: B Isolation disconnects a system from all other networked devices. So, that is not what we are looking for in this scenario. Refactoring and shimming are terms related to device drivers and not network structure. So, those two are incorrect as well. Segmentation is a term used to describe placing systems onto specialized subnets, rather than having them all on a larger network, making it our correct answer.   Interested in more practice test questions?   Get a copy of my official CertMike Practice Test books for the Security+ exam, CISSP exam, SSCP exam, or CySA+ exam and practice with hundreds of questions designed just like the real test! ...