Filters
Question type

Study Flashcards

The company that you work for has recently had a security breech. During the recover and assessment, it was discovered that the malicious user used the company VPN to gain access to the network. Now your company would like to find a way to verify the identity of a user who requests access to the company through a VPN.   What can you recommend to the company?


A) Software tokens
B) Digital certificate
C) Access control list
D) Multifactor authentication

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Your company wants to secure the new data center physically. The company has hired a security guard but wants to find a way so that only one person at a time can enter in the data center. As people enter, they will have to show the security guard identification that authorizes them to enter the data center.   What is your company's new security called?


A) Theft prevention
B) Mantrap
C) Entry control roster
D) Security outpost

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to research a new product when his computer emitted an alarm accompanied by a warning that a site had blocked his computer and that information was being stolen from the computer. The message included a phone number and a note to call the number within five minutes so that engineers could walk him through the removal process. ​ What has happened to the customer computer?


A) The client received a fake security alert.
B) This is a real alert, and the client should call the number.
C) Data is being stolen, and the client should disconnect from the network.
D) The web browser has been hijacked by a virus.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a competitor. Ken has identified an email from the vice president and has tracked the information to the person at the other company. Ken has archived the evidence that proves the data has been sent. ​ What should Ken do next?


A) Report the person through proper channels.
B) Approach the VP and ask him about the email.
C) Ignore the email; it is not his job.
D) Go right to the president of the company.

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Karen received a call from a client whose computer will not boot. The client explained that he had just received an error message about a virus on the computer. When Karen arrived, she tried to boot the computer in Safe Mode, but that did not work. Karen decided to install the hard drive on a working computer. ​ What should Karen do after she installs the hard drive on a second computer?


A) Scan the hard drive in the new computer with antivirus software.
B) Copy the important data to the working computer.
C) Get Windows updates.
D) Get malware updates.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Derek's supervisor is concerned that the company's security system does not comply with the new standards the company has decided to employ. She has asked Derek to determine how members of the company are authenticated on the network.    What does the computer or server use to verify the access to a specific resource on the network?


A) Access control list
B) Directory permissions
C) Login script
D) Digital Certificate

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

Samantha is having an issue with Windows crashing and believes that malicious software is causing it to crash. Samantha also has received application errors that have cause the applications to close.   Which event log in the Event Viewer can Samantha inspect to see if malicious software is causing the Windows system to crash and the application errors, system errors, and other types of errors?


A) System logs
B) Security logs
C) Setup logs
D) Application

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

The web server at Terry's company recently was attacked by multiple computers. The attack overwhelmed the company's web servers and caused the web servers to crash.   What type of attack occurred?


A) Botnet
B) Spyware
C) Zero-day
D) DDoS

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

Which authentication service options work with Active Directory and other types of directory servers to authenticate and authorize users and can be used together on the same network? (Select TWO.)


A) WEP
B) WPA2
C) RADIUS
D) WPA2-PSK
E) TACACS+
F) AES

G) A) and F)
H) D) and F)

Correct Answer

verifed

verified

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. ​ What can James use to wipe the data clean? (Select TWO.)


A) Zero-fill utility
B) Format the drive
C) ATA Secure Erase
D) Smash the USB drive

E) B) and D)
F) A) and C)

Correct Answer

verifed

verified

Tim has removed a virus from a customer's computer. The virus was a Trojan horse that the customer downloaded while trying to purchase software on the Internet. ​ What final step should Tim perform?


A) Schedule scans and run updates.
B) Disable System Restore in Windows.
C) Enable System Restore in Windows.
D) Educate the user.

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation, she receives an error message saying the software cannot be installed. The error reports that she does not have the privilege to install software. Jennifer is using the administrator account, so she knows she should be able to install the program. ​ What can Jennifer try next to install anti-malware software?


A) Install in Windows PE.
B) Install in Safe Mode.
C) Use Windows RE to install the software.
D) She will not be able to install the software and should reinstall Windows.

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Tracy works for an insurance company that recently received so much spam that the email server became overwhelmed and shut down. Tracy's supervisor has asked her to make sure this does not happen again.   What is the first thing Tracy should do to prevent this problem from happening again?


A) User education
B) MAC filtering
C) Firewall
D) Email filtering

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Alexandria works for a non-for-profit company that asks for donations to help the homeless people in her community. Recently the database that holds all the contact information about the donners was hacked, and all the data was copied.   What type of data was taken?


A) PII
B) PHI
C) PCI
D) GDPR

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

Jackson has completed remediation of a virus-infected system. He eliminated all the startup program issues and uninstalled several browser add-ons. Jackson has scheduled scans to be performed daily and has run updates on Windows and the anti-malware program. He has enabled System Restore and created a new restore point.   What should Jackson do to complete the malware removal process?


A) Educate the end user.
B) Document the problem.
C) Recover the user data.
D) Reinstall Windows.

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Shane is working on a new project for the sales department. The company wants a way to allow the sales force to print orders at the company headquarters. Shane has proposed that their computers be able to connect to the system using a VPN. ​ Who does Shane need to get permission from before he installs the VPN?


A) CAB
B) Sales manager
C) CIO
D) Each salesperson

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Nick is working on a computer at a customer's house. The customer is concerned that her computer has a problem because recently the Internet home page changed, and when she tried to search the Internet, a strange search engine appeared. ​ What has happened to the customer's computer?


A) The computer is infected with a network worm.
B) The computer is infected with a redirect virus.
C) A new web browser was installed.
D) A new browser add-on was installed.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Danny received this email message today.   Danny received this email message today.     What happened to Danny's computer? A)  The data is being downloaded, and Danny should disconnect from the network. B)  Danny has received a fake security alert pop-up. C)  This is a real alert, and Danny should call the number provided. D)  Danny's web browser has been hijacked by a virus. What happened to Danny's computer?


A) The data is being downloaded, and Danny should disconnect from the network.
B) Danny has received a fake security alert pop-up.
C) This is a real alert, and Danny should call the number provided.
D) Danny's web browser has been hijacked by a virus.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school system that will use them to increase storage on systems for students. However, the company also wants to make sure the hard drives are completely wiped before donating them.   Which disposal method will not allow the company to recycle the device? (Select all that apply.)


A) Shredder
B) Low level format
C) Degaussing
D) Overwrite
E) Incineration
F) Drive wipe

G) A) and C)
H) C) and F)

Correct Answer

verifed

verified

James travels for business and is always worried that his laptop will be taken from his room.   Which type of device will ensure that James's laptop will not be stolen while he travels?


A) Server lock
B) USB lock
C) Padlock
D) Cable lock

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 41 - 60 of 71

Related Exams

Show Answer