Which of the following is a vulnerability that has been exploited?
A company help desk as received several reports that employees have experienced identify theft and compromised accounts. This occurred several days after receiving an email asking them to update their personal bank information. Which of the following is a vulnerability that has been exploited?A . Trojan horsesB . PhishingC ....
Which of the following is being tested?
A technician is auditing network security by connecting a laptop to open hardwired jacks within the facility to verify they cannot connect. Which of the following is being tested?A . Layer 3 routingB . Port securityC . Secure IMAPD . S/MIMEView AnswerAnswer: B
Which of the following is the organization conducting?
During the penetration testing of an organization, the tester was provided with the names of a few key servers, along with their IP address. Which of the following is the organization conducting?A . Gray box testingB . White box testingC . Back box testingD . Isolated container testingE . Vulnerability...
Which of the following types of malware MOST likely caused this to occur?
The help desk received a call from a user who was trying to access a set of files from the day before but received the following error message: File format not recognized. Which of the following types of malware MOST likely caused this to occur?A . RansomwareB . Polymorphic virusC...
Which of the following should the engineer do to determine the issue?
A network engineer has been asked to investigate why several wireless barcode scanners and wireless computers in a warehouse have intermittent connectivity to the shipping server. The barcode scanners and computers are all on forklift trucks and move around the warehouse during their regular use. Which of the following should...
Which of the following would prevent this type of attack from reoccurring?
A tester was able to leverage a pass-the-hash attack during a recent penetration test. The tester gained a foothold and moved laterally through the network. Which of the following would prevent this type of attack from reoccurring?A . Renaming all active service accounts and disabling all inactive service accountsB ....
Which of the following should the technician select?
A technician is designing a solution that will be required to process sensitive information, including classified government data. The system needs to be common criteria certified. Which of the following should the technician select?A . Security baselineB . Hybrid cloud solutionC . Open-source software applicationsD . Trusted operating systemView AnswerAnswer:...
Which of the following would address this violation going forward?
An organization's Chief Executive Officer (CEO) directs a newly hired computer technician to install an OS on the CEO‘s: personal laptop. The technician performs the installation, and a software audit later in the month indicates a violation of the EULA occurred as a result. Which of the following would address...
Which of the following should the security administrator do NEXT?
A security administrator is working with the human resources department to classify data held by the company. The administrator has determined the data contains a variety of data types, including health information, employee names and addresses, trade secrets, and confidential customer information. Which of the following should the security administrator...
Which of the following should be implemented to reduce the spikes in traffic?
A new PKI is being bum at a company, but the network administrator has concerns about spikes of traffic occurring twice a flay due to clients checking the status of the certificates. Which of the following should be implemented to reduce the spikes in traffic?A . CRLB . OCSPC ....