NovoMed discovers encrypted data transfers of drug research and participant data to an unknown location and receives an extortion-like message implying the formula may be released. What is the most prudent course of action?
Rica works as an incident handler for an international company. As part of her role, she must review the present security policy implemented. Upon inspection, Rica finds that the policy is wide open, and only known dangerous services/attacks or behaviors are blocked. Which of the following is the current policy that Rica identified?
Patrick is doing a cyber forensic investigation. He is in the process of collecting physical
evidence at the crime scene.
Which of the following elements he must consider while collecting physical evidence?
An employee at a pharmaceutical company loses their organization-issued mobile device while attending an international conference. The device contained access to corporate email, cloud storage apps, and internal communication tools. Upon being informed, the company’s incident response team attempts to take control of the device and protect sensitive data. However, they quickly discover that no centralized management setup or security controls had been established on the device, preventing them from locking the system or removing its stored information. Which preparation step would have enabled containment in this situation?
A regional airport recently upgraded its operations with smart IoT-based baggage handling and security camera systems. During a routine cyber resilience drill mimicking device disruption, operational staff experienced confusion in executing assigned duties and lacked clarity in the communication flow. There was uncertainty about who should engage with third-party vendors, how to retrieve diagnostic logs from affected systems, and which units required priority attention to maintain continuity. Which of the following would best address these preparedness gaps?
Which one of the following is the correct flow of the stages in an incident handling and response (IH&R) process?
Sophia, a security analyst, notices that a sensitive folder on a file server was accessed during off-hours by an intern using authorized credentials. The access was not flagged because the intern's permissions had not been reviewed in months after their project ended. What process should have been enforced to avoid this insider threat?
In which of the following phases of incident handling and response (IH&R) process the identified security incidents are analyzed, validated, categorized, and prioritized?
After a recent email attack, Harry is analyzing the incident to obtain important information related to the incident. While investigating the incident, he is trying to
extract information such as sender identity, mail server, sender’s IP address, location, and so on.
Which of the following tools Harry must use to perform this task?
DeltaDynamics, a large-scale data analytics firm, found that one of its data scientists was sharing proprietary algorithms with external parties. The firm wishes to monitor its employees more closely without breaching privacy laws. What is the most effective measure it should consider?