Created by - Mary Smith
Questions 1. After a security incident,management is meeting with involved employees to document the incident and its aftermath. Which of the following BEST describes this phase of the incident response process?A) PreparationB) RecoveryC) IdentificationD) Lessons learned2. A copy of a highly confidential salary report was recently found on a printer in the IT department. The human resources department does not have this specific printer mapped to its devices,and it is suspected that an employee in the IT department browsed to the share where the report was located and printed it without authorization. Which of the following technical controls would be the BEST choice to immediately prevent this from happening again?A) Have all members of the IT department review and sign the AUP and disciplinary policiesB) Restrict access to the share where the report resides to only human resources employees and enable auditingC) Implement a DLP solution and classify the report as confidential,restricting access only to human resources staffD) Place the human resources computers on a restricted VLAN and configure the ACL to prevent access from the IT department3. A director of IR is reviewing a report regarding several recent breaches. The director compiles the following statistic - s -Initial IR engagement time frame -Length of time before an executive management notice went out -Average IR phase completion The director wants to use the data to shorten the response time. Which of the following would accomplish this?A) Containment phaseB) CSIRTC) Tabletop exerciseD) Escalation notifications4. A company would like to prevent the use of a known set of applications from being used on company computers. Which of the following should the security administrator implement?A) Application hardeningB) Disable removable mediaC) Anti-malwareD) WhitelistingE) Blacklisting5. An administrator is implementing a secure web server and wants to ensure that if the web server application is compromised,the application does not have access to other parts of the server or network. Which of the following should the administrator implement? (Choose two.)(Select 2answers)A) Attribute-based access controlB) Rule-based access controlC) Mandatory access controlD) Discretionary access controlE) Role-based access control Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: CExplanation: 4. Right Answer: EExplanation: 5. Right Answer: B,CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. An end-user is attempting to access a file-sharing site to download files shared by a customer, but is receiving a message stating the site has been blocked. Which of the following is the MOST likely cause of this issue?A) A. Antivirus softwareB) B. Internet connectivity issuesC) C. Ransomware infectionD) D. Content-filtering2. After several passes with a malware removal program, the program keeps detecting the same malware infection after a reboot. Which of the following should be done to attempt to remove the offending malware?A) A. Run the malware removal program while disconnected from the InternetB) B. Run the malware removal program in Windows Safe ModeC) C. Reinstall the malware removal program from a trusted sourceD) D. Set the malware removal program to run each time the computer is rebooted3. On a corporate network, which of the following features would be used to redirect network traffic for filtering or monitoring?A) A. Content AdvisorB) B. Proxy SettingsC) C. Network Drive MappingD) D. Local Security Policy4. A user is looking for the Application Data directory in their profile but cannot see it. Which of the following Control Panel options would correct this?A) A. SystemB) B. DisplayC) C. User AccountsD) D. Folder Options5. While navigating a Windows machine through command prompt, which of the following commands will the technician use to display the contents of the current folder?A) A. cdB) B. dirC) C. mdD) D. rd Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: BExplanation: 3. Right Answer: BExplanation: 4. Right Answer: DExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?A) A. Email addressB) B. Phone numberC) C. Mother's maiden nameD) D. Last name2. A user will be traveling with a smartphone that contains confidential information. Which of the following should be disabled? (Select TWO).(Select 2answers)A) A. KeyboardB) B. SpeakersC) C. MouseD) D. BluetoothE) E. NFC3. A technician wants to minimize the risk of having third parties track previously visited web pages. Which of the following should be performed in the Internet browsers settings? (Select TWO).(Select 2answers)A) A. Select form dataB) B. Disable location servicesC) C. Remove cookiesD) D. Clear historyE) E. Change passwords4. When setting up a new device, there are multiple features available that will never be used. Which of the following should the user do to make the new device more secure?A) A. Make all users administrators.B) B. Remove or disable the unnecessary features.C) C. Install a password manager on the device.D) D. Make all users guests.5. Joe, a user, saves a document to a flash drive on his computer in order to print the document from a public computer kiosk. After returning home and reinserting the flash drive in his computer, the security software identifies an infected file on the flash drive. Which of the following is the MOST likely cause of the infection?A) A. The flash drive was infected by a war driving hacker on the way to the public kiosk.B) B. The public workstation was infected by Joe - s flash drive.C) C. The public workstation was infected and passed the virus to the flash drive.D) D. The flash drive was already infected by the user's computer. Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: D,EExplanation: 3. Right Answer: C,DExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A bank requires tellers to get manager approval when a customer wants to open a new account. A recent audit shows that there have been four cases in the previous year where tellers opened accounts without management approval. The bank president thought separation of duties would prevent this from happening. In order to implement a true separation of duties approach the bank could:A) Administer account creation on a rule based access control approachB) Administer account creation on a role based access control approachC) Require the use of two different passwords held by two different individuals to open an accountD) Require all new accounts to be handled by someone else other than a teller since they have different duties2. A global gaming console manufacturer is launching a new gaming platform to its customers. Which of the following controls reduces the risk created by malicious gaming customers attempting to circumvent control by way of modifying consoles?(Select 2answers)A) Firmware version controlB) Vulnerability scanningC) Automatic updatesD) Network segmentationE) Application firewallsF) Manual software upgrades3. A company recently replaced its unsecure email server with a cloud-based email and collaboration solution that is managed and insured by a third party. Which of the following actions did the company take regarding risks related to its email and collaboration services?A) MitigationB) TransferenceC) AcceptanceD) Deterrence4. A company recently experienced data exfiltration via the corporate network. In response to the breach,a security analyst recommends deploying an out-of-band IDS solution. The analyst says the solution can be implemented without purchasing any additional network hardware. Which of the following solutions will be used to deploy the IDS?A) Network proxyB) Port mirroringC) HoneypotD) Network tap5. An administrator has concerns regarding the traveling sales team who works primarily from smart phones. Given the sensitive nature of their work,which of the following would BEST prevent access to the data in case of loss or theft?A) Enable screensaver locks when the phones are not in use to prevent unauthorized accessB) Enable GPS tracking on all smart phones so that they can be quickly located and recoveredC) Configure the smart phones so that the stored data can be destroyed from a centralized locationD) Configure the smart phones so that all data is saved to removable media and kept separate from the device Right Answer and Explanation: 1. Right Answer: DExplanation: 2. Right Answer: A,CExplanation: 3. Right Answer: BExplanation: 4. Right Answer: BExplanation: 5. Right Answer: CExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. Which of the following Windows features would be used to encrypt a single file or folder?A) A. EFSB) B. NTFSC) C. BitLockerD) D. Security2. A new user reports trying to login to a workstation but, when pressing CTRL+ALT+DEL, they are asked for a PIN. Which of the following should be done NEXT?A) A. Enter all passwords they have used in the pastB) B. Verify a smart card has been issuedC) C. Check the network cableD) D. Reboot the computer3. Which of the following file system types is used primarily for optical media?A) A. FAT32B) B. NTFSC) C. HPFSD) D. CDFS4. A technician recently created an email account for a new user, Joe. On the second day, Joe reports his email account is full of spam even though he has not given out his address. Which of the following should the technician do to resolve the issue?A) A. Turn on windows firewallB) B. Click the unsubscribe link in the spamC) C. Run an anti-spyware scanD) D. Install privacy filter5. Which of the following command-line tools will terminate a non-system process without restarting the computer?A) A. ShutdownB) B. KillC) C. EraseD) D. Break Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: BExplanation: 3. Right Answer: DExplanation: 4. Right Answer: CExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user is browsing the Internet when suddenly a threatening message appears on screen demanding a payment in order to avoid the system being disabled.Which of the following BEST describes this type of malware infection?A) A. RansomwareB) B. AdwareC) C. SpywareD) D. Virus2. Which of the following is an example of ransomware?A) A. A user is asked to pay a fee for a password to unlock access to their files.B) B. A user receives an email demanding payment for a trial application that has stopped working.C) C. A user has opened an Internet browser and is taken to a site that is not the normal home page.D) D. A user is asked to open an attachment that verifies the price of an item that was not ordered.3. An employee, Joe, forgot his laptop at the airport. Joe is worried about unauthorized access. Which of the following BEST protects against data theft in this instance?A) A. Security softwareB) B. Full disk encryptionC) C. Cable lockD) D. Username and passwordE) E. Patching the OS and third party software4. Multiple laptops that contain confidential data are stolen from a company. Which of the following is a likely policy change resulting from this incident?A) A. Enabling full disk encryptionB) B. Requiring screensaver passwordC) C. Disabling Bluetooth adaptersD) D. Adding multifactor authentication5. A user receives an email formatted to appear as if the bank sent it. The email explains that the user must confirm the name, address, and social security number listed on the bank account. Which of the following BEST describes the security threat taking place?A) A. Shoulder surfingB) B. Social engineeringC) C. SpamD) D. Phishing Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: BExplanation: 4. Right Answer: AExplanation: 5. Right Answer: DExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A consumer purchases an exploit from the dark web. The exploit targets the online shopping cart of a popular website,allowing the shopper to modify the price of an item at checkout. Which of the following BEST describes this type of user?A) InsiderB) CompetitorC) APTD) HacktivistE) Script kiddie2. A company hired a firm to test the security posture of its database servers and determine if any vulnerabilities can be exploited. The company provided limited imformation pertaining to the infrastructure and database server. Which of the following forms of testing does this BEST describe?A) Gray boxB) Black boxC) White boxD) Vulnerability scanning3. A company has just completed a vulnerability scan of its servers. A legacy application that monitors the HVAC system in the datacenter presents several challenges,as the application vendor is no longer in business. Which of the following secure network architecture concepts would BEST protect the other company servers if the legacy server were to be exploited?A) Air gapB) VirtualizationC) ExtranetD) VLAN4. A database backup schedule consists of weekly full backups performed on Saturday at 12:00 a.m. and daily differential backups also performed at 12:00 a.m. If the database is restored on Tuesday afternoon,which of the following is the number of individual backups that would need to be applied to complete the database recovery?A) 2B) 1C) 4D) 35. A company is deploying a file-sharing protocol access a network and needs to select a protocol for authenticating clients. Management requests that the service be configured in the most secure way possible. The protocol must also be capable of mutual authentication,and support SSO and smart card logons. Which of the following would BEST accomplish this task?A) Implement KerberosB) Use NTLM authenticationC) Store credentials in LDAPD) Use MSCHAP authentication Right Answer and Explanation: 1. Right Answer: EExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A technician is configuring a SOHO wireless router for a small business with three employees. After the three employees- laptops have successfully connected to the wireless network, the company would like to prevent additional access to the wireless network. The technician enables WPA2 on the wireless router. Which of the following additional settings should the technician change?A) A. Enable MAC filteringB) B. Disable SSID broadcastC) C. Reduce radio power levelD) D. Update router firmware2. A user calls the help desk because a folder containing critical business files is missing from the local drive.The user is adamant that the folder was there the previous day, and cannot understand why it is gone. The technician views the properties of the parent folder and sees a back up listed on the -Prior Versions tab.According to the theory of troubleshooting, which of the following is the technician-s NEXT step?A) A. Establish a theory of probable causeB) B. Establish a plan of action and implement the solutionC) C. Document findings, actions, and outcomesD) D. Verify full system functionality and implement preventive measures3. Which of the following tasks is automatically added to the task scheduler in Windows to keep hard disk performance up?A) A. defragB) B. chkdskC) C. cleanmgrD) D. diskpart4. Joe, a user, just downloaded a game onto his company phone. When he is not using the device, it unexpectedly dials unrecognized numbers and downloads new content. Joe is the victim of which of the following?A) A. Trojan horseB) B. SpywareC) C. Social engineeringD) D. Worms5. A local administrator would like to determine why a laptop is taking so long to boot into the operating system.Which of the following tabs in MSCONFIG would the administrator access to BEST determine this?A) A. StartupB) B. ToolsC) C. GeneralD) D. Boot Right Answer and Explanation: 1. Right Answer: AExplanation: 2. Right Answer: AExplanation: 3. Right Answer: AExplanation: 4. Right Answer: AExplanation: 5. Right Answer: AExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Created by - Mary Smith
Questions 1. A user, Ann, is concerned about theft of her laptop and does not want a thief to have easy access to all of her banking and email. Which of the following precautions could be taken to mitigate this issue?A) A. Only browse the Internet on WiFi connections that use WPA2B) B. Turn off the guest account in the operating systemC) C. Disable autofill functionality within the web browserD) D. Remove any legacy browsers from the computer2. A user is configuring a new wireless router. Which of the following should be done to ensure that unauthorized changes cannot be made?A) A. Change the SSIDB) B. Change the router - s addressC) C. Change the administrator passwordD) D. Change the encryption key3. Which of the following would BEST be described as password best practices? (Select THREE).(Select 3answers)A) A. Use of long passwordsB) B. Sharing passwords with a trusted sourceC) C. Limiting password reuseD) D. Keeping default passwordsE) E. Use of special charactersF) F. Writing down difficult passwords4. A user, Ann, receives a call asking for her password to troubleshoot a problem. Which of the following describes this type of security threat?A) A. MalwareB) B. Social engineeringC) C. SpamD) D. Physical security5. Malware that has an embedded keylogger to capture all of the keystrokes and steal logins is considered:A) A. adwareB) B. spywareC) C. ransomwareD) D. phishing Right Answer and Explanation: 1. Right Answer: CExplanation: 2. Right Answer: CExplanation: 3. Right Answer: A,C,EExplanation: 4. Right Answer: BExplanation: 5. Right Answer: BExplanation: .col-md-12 { -webkit-user-select: none; -ms-user-select: none; user-select: none; } .flash-sale-container{background:#134981;text-align:center;padding:2%;} p.flash-sale-text{ font-size:24px;font-family:"Poppins";letter-spacing:2px;line-height:1.4em; } span.flash-break{ display:block; } .flash-sale-text { -webkit-animation-name:flash; animation: blink 1.5s infinite; } @keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } } @-webkit-keyframes blink{ 0% { color: #D3585F; } 20% { color: #D3585F; } 40% { color: #FFF; } 60% { color: #FFF; } 80% { color: #D3585F; } 100% { color: #D3585F; } }
More detailsPublished - Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Fri, 03 Mar 2023
Write a public review