PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is occurring?

A security audit identifies a number of large email messages being sent by a specific user from their
company email account to another address external to the company. These messages were sent prior to
a company data breach, which prompted the security audit. The user was one of a few people who had
access to the leaked data. Review of the suspect’s emails show they consist mostly of pictures of the user
at various locations during a recent vacation. No suspicious activities from other users who have access to
the data were discovered.
Which of the following is occurring?

Which of the following describes how the employee is leaking these secrets?

A security analyst has been notified that trade secrets are being leaked from one of the executives in the
corporation. When reviewing this executive’s laptop they notice several pictures of the employee’s pets
are on the hard drive and on a cloud storage network. When the analyst hashes the images on the hard
drive against the hashes on the cloud network they do not match.
Which of the following describes how the employee is leaking these secrets?

Which of the following should the security administrator use to identify similar malware?

The security administrator is implementing a malware storage system to archive all malware seen by the
company into a central database. The malware must be categorized and stored based on similarities in
the code. Which of the following should the security administrator use to identify similar malware?


Page 677 of 4,924« First...102030...675676677678679...690700710...Last »