PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following initial steps should Ann implement before sending documents?

Company XYZ has suffered leaks of internally distributed confidential documents. Ann the network
security analyst has been tasked to track down the culprit. She has decided to embed a four letter
string of characters in documents containing proprietary information. Which of the following initial

steps should Ann implement before sending documents?

Which of the following BEST describes the compromised system?

An administrator is investigating a system that may potentially be compromised and sees the
following log entries on the router.
*Jul 15 14:47:29.779: %Router1: list 101 permitted TCP 192.10.3.204(57222) (FastEthernet 0/3) –
> 10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779: %Router1: list 101 permitted TCP 192.10.3.204(57222) (FastEthernet 0/3) –
> 10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779: %Router1: list 101 permitted TCP 192.10.3.204(57222) (FastEthernet 0/3) –
> 10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?