Computers

Image

Sec+ Terms Domain 2 2/2

1
play

10 questions

Show Answers
See Preview
  • 1. Multiple Choice
    1 minute
    1 pt
    Encryption, antivirus software, IDSs, firewalls, and the principle of least privilege are some examples of which control type?
    Technical
    Management
    Operational
    Succession
  • 2. Multiple Choice
    1 minute
    1 pt
    A _ is an electronic file used to transport keys used to encrypt or digitally sign messages.
    digital certificate
    key escrow
    user patch
    hash algorithm
  • 3. Multiple Choice
    1 minute
    1 pt
    When collecting evidence, a team starts with data in cache memory, followed by data in RAM, and finally data stored on local disk drives. This refers to what?
    Order of Volatility
    Chain of Custody
    Layered Screenshots
    Data Hijacking
  • Answer choices
    Tags
    Answer choices
    Tags

    Explore all questions with a free account

    Already have an account?