Which of the following digital forensics activities would a security team perform when responding to legal requests in a pending investigation?
A forensic engineer determines that the root cause of a compromise is a SQL injection attack. Which of the following should the engineer review to identify the command used by the threat actor?
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?
Which of the following should an internal auditor check for first when conducting an audit of the organization's risk management program?