Exam Name: | GIAC Security Essentials | ||
Exam Code: | GSEC Dumps | ||
Vendor: | GIAC | Certification: | Security Administration |
Questions: | 385 Q&A's | Shared By: | izaiah |
You have reason to believe someone with a domain user account has been accessing and modifying sensitive spreadsheets on one of your application servers. You decide to enable auditing for the files to see who is accessing and changing them. You enable the Audit Object Access policy on the files via Group Policy. Two weeks later, when you check on the audit logs, you see they are empty. What is the most likely reason this has happened?
What is needed for any of the four options for Azure AD multi-factor user authentication?
A US case involving malicious code is brought to trial. An employee had opened a helpdesk ticket to report specific instances of strange behavior on her system. The IT helpdesk representative collected information by interviewing the user and escalated the ticket to the system administrators. As the user had regulated and sensitive data on her computer, the system administrators had the hard drive sent to the company's forensic consultant for analysis and configured a new hard drive for the user. Based on the recommendations from the forensic consultant and the company's legal department, the CEO decided to prosecute the author of the malicious code. During the court case, which of the following would be able to provide direct evidence?
Which of the following languages enable programmers to store cookies on client computers? Each correct answer represents a complete solution. Choose two.