Multiple Choice
Which of the following is the proper use of a Faraday cage?
A) To block electronic signals sent to erase a cell phone
B) To capture packets sent to a honeypot during an attack
C) To protect hard disks from access during a forensics investigation
D) To restrict access to a building allowing only one person to enter at a time
Correct Answer:

Verified
Correct Answer:
Verified
Q75: A group of developers is collaborating to
Q76: A computer on a company network was
Q77: An employee receives an email, which appears
Q78: A security team wants to establish an
Q79: A threat actor motivated by political goals
Q81: An organization is providing employees on the
Q82: A company has three divisions, each with
Q83: An organization's IRP prioritizes containment over eradication.
Q84: A network technician is trying to determine
Q85: A chief Financial Officer (CFO) has asked