1. A vulnerability scan is being conducted against a desktop system. The scan is looking for files,versions,and registry values known to be associated with system vulnerabilities. Which of the following BEST describes the type of scan being performed?
A) Non-intrusive B) Active C) Credentialed D) Authenticated
2. Management wants to ensure any sensitive data on company-provided cell phones is isolated in a single location that can be remotely wiped if the phone is lost. Which of the following technologies BEST meets this need?
A) Geofencing B) Sandboxing C) Containerization D) Device encryption
3. A user downloads and installs an MP3 converter,and runs the application. Upon running the application,the antivirus detects a new port in a listening state. Which of the following has the user MOST likely executed?
A) Worm B) RAT C) Ransomware D) Bot
4. During a recent audit,several undocumented and unpatched devices were discovered on the internal network. Which of the following can be done to prevent similar occurrences?
A) Configure the WAPs to use NAC and refuse connections that do not pass the health check B) Implement rogue system detection and configure automated alerts for new devices C) Install DLP controls and prevent the use of USB drives on devices D) Run weekly vulnerability scans and remediate any missing patches on all company devices
5. During a recent audit,it was discovered that many services and desktops were missing security patches. Which of the following BEST describes the assessment that was performed to discover this issue?
A) Port Scan B) Network mapping C) Vulnerability scan D) Protocol analysis
Leave a comment