1. Joe,a user,reports to the help desk that he can no longer access any documents on his PC. He states that he saw a window appear on the screen earlier,but he closed it without reading it. Upon investigation,the technician sees high disk activity on Joe - s PC. Which of the following types of malware is MOST likely indicated by these findings?
A) Crypto-malware
B) Trojan
C) Rootkit
D) Keylogger
2. Following the successful response to a data-leakage incident,the incident team lead facilitates an exercise that focuses on continuous improvement of the organization's incident response capabilities. Which of the following activities has the incident team lead executed?
A) Root cause analysis
B) Lessons learned review
C) Corrective action exercise
D) Incident audit
3. A system administrator wants to provide balance between the security of a wireless network and usability. The administrator is concerned with wireless encryption compatibility of older devices used by some employees. Which of the following would provide strong security and backward compatibility when accessing the wireless network?
A) WPA using a preshared key
B) WPA2 using a RADIUS back-end for 802.1x authentication
C) WEP with a 40-bit key
D) Open wireless network and SSL VPN
4. A user of the wireless network is unable to gain access to the network. The symptoms are: 1.) Unable to connect to both internal and Internet resources 2.) The wireless icon shows connectivity but has no network access The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate. Which of the following is the MOST likely cause of the connectivity issues?
A) The DHCP scope is full
B) The dynamic encryption key did not update while the user was offline
C) A remote DDoS attack against the RADIUS server is taking place
D) The user's laptop only supports WPA and WEP
E) The wireless signal is not strong enough
5. A technician is configuring a load balancer for the application team to accelerate the network performance of their applications. The applications are hosted on multiple servers and must be redundant. Given this scenario,which of the following would be the BEST method of configuring the load balancer?
A) Round-robin
B) Weighted
C) Locality-based
D) Least connection
Write a public review