Which of the following is the proper use of a Faraday cage?
A) To block electronic signals sent to erase a cell phone
B) To capture packets sent to a honeypot during an attack
C) To protect hard disks from access during a forensics investigation
D) To restrict access to a building allowing only one person to enter at a time
Correct Answer:
Verified
Q492: Which of the following is a passive
Q493: A security administrator has received multiple calls
Q494: A security administrator found the following piece
Q495: In highly secure environments where the risk
Q496: A systems engineer wants to leverage a
Q498: Joe, an employee, knows he is going
Q499: Ann, a user, reported to the service
Q500: A Chief Security Office's (CSO's) key priorities
Q501: Which of the following incident response steps
Q502: A computer forensics analyst collected a flash
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents