Which data type is protected through hard disk encryption?
Question No 3
Your supervisor suspects that someone is attempting to gain access to a Windows computer by
guessing user account IDs and passwords. The supervisor asks you to use the Windows Event Viewer
security logs to verify the attempts.
Which two audit policy events provide information to determine whether someone is using invalid
credentials to attempt to log in to the computer? (Choose 2.)
Note You will receive partial credit for each correct selection.
Question No 4
You are going to perform a penetration test on a company LAN. As part of your preparation, you
access the company’s websites, view webpage source code, and run internet searches to uncover
domain information. You also use social media to gather details about the company and its
employees.
Which type of reconnaissance activities are you performing?
Question No 5
Your manager asks you to review the output of some vulnerability scans and report anything that
may require escalation.
Which two findings should you report for further investigation as potential security vulnerabilities?
(Choose 2.)