1. A technician receives a device with the following anomalies: Frequent pop-up ads Show response-time switching between active programs Unresponsive peripherals The technician reviews the following log file entries: File Name Source MD5 Target MD5 Status antivirus.exe F794F21CD33E4F57890DDEA5CF267ED2 F794F21CD33E4F57890DDEA5CF267ED2 Automatic iexplore.exe 7FAAF21CD33E4F57890DDEA5CF29CCEA AA87F21CD33E4F57890DDEAEE2197333 Automatic service.exe 77FF390CD33E4F57890DDEA5CF28881F 77FF390CD33E4F57890DDEA5CF28881F Manual USB.exe E289F21CD33E4F57890DDEA5CF28EDC0 E289F21CD33E4F57890DDEA5CF28EDC0 Stopped Based on the above output,which of the following should be reviewed?
A) The file integrity check B) The data execution prevention C) The removable media control D) The web application firewall
2. Joe,a member of the sales team,recently logged into the company servers after midnight local time to download the daily lead form before his coworkers did. Management has asked the security team to provide a method for detecting this type of behavior without impeding the access for sales employee as they travel overseas. Which of the following would be the BEST method to achieve this objective?
A) Install DLP software on the devices used by sales employees. B) Create an automated alert on the SIEM for anomalous sales team activity. C) Implement a filter on the mail gateway that prevents the lead form from being emailed. D) Configure time-of-day restrictions for the sales staff.
3. A vulnerability scanner that uses its running service - s access level to better assess vulnerabilities across multiple assets within an organization is performing a:
A) Passive scan. B) Privilege escalation test. C) Credentialed scan. D) Non-intrusive scan.
4. A user receives an email from ISP indicating malicious traffic coming from the user's home network is detected. The traffic appears to be Linux-based,and it is targeting a website that was recently featured on the news as being taken offline by an Internet attack. The only Linux device on the network is a home surveillance camera system. Which of the following BEST describes what is happening?
A) The camera system is infected with a bot. B) The camera system is infected with a Trojan. C) The camera system is infected with a backdoor. D) The camera system is infected with a RAT.
5. A user has attempted to access data at a higher classification level than the user - s account is currently authorized to access. Which of the following access control models has been applied to this user - s account?
Leave a comment