$Test Out PC Pro Chapter 12 Practice Questions Answers (Answers for Final)$

Unlock all answers in this set

Unlock answers
question
12.1.5
answer
...
question
Which security practice is an example of the Principle of Least Privilege?
answer
All users on a Windows workstation are limited users except for one user who is responsible for maintaining the system.
question
Which of the following actions directly improves system security on Windows systems? (Select two.)
answer
*Install anti-malware software. *Enable the Windows firewall.
question
Which are examples of a strong password? (Select two.)
answer
*TuxP3nguinsRn0v3l *il0ve2EatIceCr3am
question
One of the Windows workstations you manage has four user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. The fourth account is the Guest user account, which has been enabled to allow management employees convenient workstation access. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. Autorun has been disabled on the system. What should you do to increase the security of this system?
answer
Disable the Guest account.
question
One of the Windows workstations you manage has three user accounts defined on it. Two of the users are limited users while the third (your account) is an administrative user. Each limited and administrative user has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system? (Select two.)
answer
*Disable autorun on the system. *Set a screensaver password.
question
Your client has hired you to evaluate their wired network security posture. As you tour their facility, you note the following: • Server systems are kept in a locked server room. • User accounts on desktop systems have strong passwords assigned. • A locked door is used to control access to the work area. Users must use ID badges to enter the area. • Users connect their personal mobile devices to their computers using USB cables. • Users work in three 8hour shifts per day. Each computer is shared by three users. Each user has a limited account on the computer they use. Based on this information, what should you recommend your client do to increase security?
answer
Disable the USB ports on user's workstations.
question
You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. File and folder permissions have been assigned to prevent users from accessing each other's files. What else could you do to increase the security of this system? (Select two.)
answer
*Secure the system to the desk with a cable lock. *Install a privacy filter on the monitor.
question
Match each security policy on the left with the appropriate description on the right. Each security policy may be used once, more than once, or not at all.
answer
Provides a highlevel overview of the organization's security program. **Organizational Security Policy Defines an employee's rights to use company property. **Acceptable Use Policy Identifies the requirements for credentials used to authenticate to companyowned systems. **Password Policy Identifies a set of rules or standards that define personal behaviors. **Code of Ethics Sets expectations for user privacy when using company resources. **Acceptable Use Policy Specifies that user accounts should be locked after a certain number of failed login attempts. **Password Policy
question
12.2.4
answer
...
question
The chain of custody is used for what purposes?
answer
Retaining evidence integrity by identifying people coming into contact with evidence
question
Which of the following is an important aspect of evidence gathering?
answer
Backing up all log files and audit trails
question
You have been asked to draft a document related to evidence gathering that contains details about personnel in possession and control of evidence from the time of discovery up through the time of presentation in court. What type of document is this?
answer
Chain of custody
question
When conducting a forensic investigation, and assuming that the attack has been stopped, which of the following actions should you perform first?
answer
Document what's on the screen
question
The immediate preservation of evidence is paramount when conducting a forensic analysis. Which of the following actions is most likely to destroy critical evidence?
answer
Rebooting the system
question
A security incident is currently occurring on the company network. You discover that the attack involves a computer system that is attached to the network. You're not sure yet exactly what kind of damage is being done to the network systems or data. What action should you take first?
answer
Stop the attack and contain the damage by disconnecting the system from the network.
question
12.3.7
answer
...
question
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a biometric fingerprint lock. A receptionist is located next to the locked door in the reception area. She uses an iPad application to log any security events that may occur. She also uses her iPad to complete work tasks as assigned by the organization's CEO. Network jacks are provided in the reception area such that employees and vendors can access the company network for workrelated purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security? (Select two.)
answer
*Train the receptionist to keep her iPad in a locked drawer when not in use. *Disable the network jacks in the reception area.
question
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the best protection to implement to address your concerns?
answer
Use cable locks to chain the laptops to the desks.
question
You need to enable a screen saver password on the Windows workstations in your organization. Which Control Panel option should you use to do this?
answer
Personalization
question
You are responsible for disposing of several old workstations formerly used by accountants in your organization's Finance department. Before being shipped to a computer recycler, you decide to make sure any old data on the hard drives is erased. To do this, you use the Windows XP Installation CDs that came with these systems to delete all partitions from the hard drives. Have you properly prepared theses systems for disposal?
answer
No, you should use disk wiping software to fully erase the drives.
question
You have purchased new computers and will be disposing of your old computers. Instead of recycling the computers, you decide to resell them by placing an ad on the Internet. These computers were previously used for storing sensitive information. What should you do prior to getting rid of the computers?
answer
Use data wiping software to clear the hard drives
question
You have a set of DVDRW discs that have been used to archive files for your latest development project. You need to dispose of the discs. Which of the following methods should you use to best prevent extracting data from the discs?
answer
Shredding
question
You have purchased new computers and will be disposing of your old computers. These computers were previously used for storing highlysensitive customer order information, including credit card numbers. What should you do prior to getting rid of the computers?
answer
Physically destroy the hard drives with a hammer.
question
While reviewing video files from your organization's security cameras, you notice a suspicious person using piggybacking to gain access to your building. The individual in question did not have a security badge. Which security measure could you implement to keep this from happening in the future?
answer
Mantraps
question
You provide desktop support at the branch office of a bank. One of the Windows workstations you manage is used by a bank employee to set up new customer accounts and fill out customer loan applications. Each user account on the system has been assigned a strong password. A cable lock has been installed to prevent it from being stolen. What else could you do to increase the security of this system? (Select two.)
answer
*Remove the optical drive *Disable all USB ports in the BIOS/UEFI firmware configuration
question
12.4.3
answer
...
question
Which of the following are common forms of social engineering attack?
answer
Hoax virus information emails.
question
Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or Websites that impersonate an online entity that the victim trusts, such as a financial institution or wellknown ecommerce site?
answer
Phishing
question
Which of the following are examples of social engineering? (Select two.)
answer
*Dumpster diving *Shoulder surfing
question
What is the best countermeasure against social engineering?
answer
User awareness training
question
You are a security consultant and an organization has hired you to review their security measures. They are chiefly concerned that they could become the victim of a social engineering attack. What should you recommend they do to mitigate the risk?
answer
Teach users how to recognize and respond to social engineering attacks.
question
Several users have forwarded you an email stating that your company's health insurance provider has just launched a new web site for all employees. To access the site they are told in the email to click a link and provide their personal information. Upon investigation, you discover that your company's health insurance provider did not send this email. What kind of attack just occurred?
answer
Phishing
question
An intruder waits near an organization's secured entrance until an employee approaches the entrance and unlocks it with a security badge. The intruder falls in line behind the employee, who assumes the intruder is another employee and holds the door open for her. What kind of attack just occurred?
answer
Tailgating
question
A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the Accounting department in the employee's company. She relates that she has forgotten her password demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. What kind of attack has occurred in this scenario?
answer
Masquerading
question
A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small African nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded to the sender and was instructed to send her bank account number so that it could be used to facilitate the transfer. She complied, and then the sender used the information to drain her bank account. What type of attack occurred?
answer
Phishing
question
12.5.5
answer
...
question
Which security measure can be used to generate and store cryptographic keys?
answer
Trusted Platform Module (TPM)
question
Which of the following functions are performed by the TPM?
answer
Create a hash based on installed system components
question
You want to configure your computer so that a password is required before the operating system will load. What should you do?
answer
Configure a user password in the BIOS/UEFI
question
You have purchased a used computer from a computer liquidator. When you boot the computer, you find that there has been a password set on the BIOS. You need to clear the password so that you can edit the CMOS settings. What should you do?
answer
Move the motherboard jumper.
question
Which of the following would indicate when a system case cover is removed?
answer
Chassis intrusion detection
question
You just bought a new notebook. This system uses UEFI firmware and comes with Windows 10 preinstalled. However, you want to use Linux on this system. You download your favorite distribution and install it on the system, removing all Windows partitions on the hard disk in the process. When the installation is complete, you find that the operating system won't load when the system is rebooted. What should you do?
answer
Disable SecureBoot in the UEFI configuration.
question
You just bought a new computer. This system uses UEFI firmware and comes with Windows 10 preinstalled. You recently accessed the manufacturer's support website and saw that a UEFI firmware update has been released. You download the update. However, when you try to install the update, an error message is displayed indicating the digital signature on the update file is invalid. Why did this happen?
answer
The update file has been tampered with.
question
12.6.8
answer
...
question
You have just installed antimalware software on all computers on your company's network. Which additional actions should you take to help protect systems from malicious software? (Select two.)
answer
*Train users to scan removable storage devices before copying files. *Configure the software to automatically update its definition files.
question
To tightly control the antimalware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware. Which of the following actions would best prevent this scenario from occurring again?
answer
Configure the software to automatically download the definition file updates as soon as they become available.
question
You have installed antimalware software on a computer that only you use. You want to protect the computer from files that you download from the Internet. What should you do next to make sure that there aren't any existing files on your system that are infected? (Select two.)
answer
*Download the latest definition files *Run a full scan
question
While running a full system scan using your antimalware software, three files have been identified as possible problems. You want to keep the files intact so you can review them later, but you also need to ensure they can't harm anything else on your computer. What action should you take?
answer
Quarantine the files
question
Which of the following best describes spyware?
answer
It monitors the actions you take on your machine and sends the information back to its originating source.
question
What is a cookie?
answer
A file saved on your hard drive that tracks Web site preferences and use.
question
Which type of malicious activity can be described as numerous unwanted and unsolicited e-mail messages sent to a wide range of victims?
answer
Spamming
question
While browsing the Internet, you notice that your browser displays popups containing advertisements that are related to recent keyword searches you have performed. What is this an example of?
answer
Adware
question
What are the most common means of virus distribution? (Select two.)
answer
*Malicious web sites *E-mail
question
After installing new software a few days ago, your DVD drive tray randomly began to open and close. Today, you were called into your boss's office to discuss why you are calling 900 numbers while at work. Which type of malware would create these symptoms?
answer
Grayware
question
12.7.11
answer
...
question
Which of the following is not a form of biometrics?
answer
Token device
question
What do biometrics use to perform authentication of identity?
answer
Human characteristics
question
Which of the following security technologies stores identification information in either a magnetic strip, radio frequency transmitter, or hardware contacts to authorize access to a computer?
answer
Smart card
question
Which of the following is the most common form of authentication?
answer
Username and password
question
Which type of biometric authentication uses the ridges of your skin?
answer
Fingerprint
question
Which of the following is an example of a strong password?
answer
a8bT11$yi
question
Which of the following security measures is a form of biometrics?
answer
Fingerprint scanner
question
You are configuring the local security policy of a Windows system. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. Which policies should you configure? (Select two.)
answer
*Account lockout threshold *Minimum password length
question
While trying to log on, a user accidentally typed the wrong password three times, and now the system is locked because he entered too many incorrect passwords. He still remembers his password, but he just typed it wrong. He needs access as quickly as possible. What should you do?
answer
Unlock the account
question
You manage two computers with the following user accounts: • Wrk1 has user accounts Mary and Admin. The Mary account does not have a password set? the Admin account does. • Wrk2 has user accounts Mary and Julia. The Mary account has a password set? the Julia account does not. You are working from Wrk2 and would like to access a shared folder on Wrk1. What credentials should you use to access the shared folder?
answer
Type Admin for the username and specify the password
question
A user is trying to log into her notebook computer. She enters the correct password for her user account, but the system won't let her authenticate, claiming the wrong password has been entered. What's causing the problem?
answer
She has enabled Num Lock, causing numbers to be sent from the keyboard instead of letters.
question
Following Windows installation, you enabled the builtin Administrator account. You remove the password for this account. You enable Remote Desktop on your computer using the default settings. From home, you try to access your computer using Remote Desktop using the Administrator account, but you are unable to log on. What should you do?
answer
Configure a password for the Administrator account
question
You are configuring the local security policy of a Windows system. You want to prevent users from reusing old passwords. You also want to force them to use a new password for at least 5 days before changing it again. Which policies should you configure? (Select two.)
answer
*Enforce password history *Minimum password age
question
Which TCP/IP protocol is a secure form of HTTP that uses SSL as a sublayer for security?
answer
HTTPS
question
You want a security solution that protects the entire hard drive, preventing access even when it is moved to another system. Which solution would you choose?
answer
BitLocker
question
Which of the following security solutions would prevent a user from reading a file which she did not create?
answer
EFS
question
Which of the following protocols establish a secure connection and encrypt data for a VPN? (Select three.)
answer
*IPSec *PPTP *L2TP
question
Which of the following forms of networking is highly susceptible to eavesdropping (data interception) and must be secured accordingly?
answer
Wireless
question
Which of the following security measures encrypts the entire contents of a hard drive?
answer
DriveLock
question
Which of the following provides security for wireless networks?
answer
WPA2
question
Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
answer
WEP, WPA Personal, and WPA2 Personal
question
A VPN is used primary for what purpose?
answer
Support secured communications over an untrusted network
question
12.9.5
answer
...
question
Which of the following is the most secure security protocol for wireless networks?
answer
WPA2
question
Which of the following features is supplied by WPA2 on a wireless network? (Select two.)
answer
*Encryption *Authentication
question
Which of the following measures will make your wireless network less visible to the casual attacker performing war driving?
answer
Disable SSID broadcast
question
What is the least secure place to locate an omnidirectional access point when creating a wireless network?
answer
Near a window
question
You've just finished installing a wireless access point for a client. Which action best protects the access point from unauthorized tampering with its configuration settings?
answer
Changing the administrative password
question
You've just installed a wireless access point (WAP) for your organization's network. You know that the radio signals used by the WAP extend beyond your organization's building and are concerned that unauthorized users outside may be able to access your internal network. What can you do to protect the wireless network? (Select two.)
answer
*Configure the WAP to filter out unauthorized MAC addresses. *Use the WAP's configuration utility to reduce the radio signal strength.
question
You are implementing a wireless access point for a small business. To secure the access point, you decide to implement WPA2 using AES to encrypt the data. The access point's configuration interface asks you to specify the AES key size. The business owner needs the access point to be as secure as possible. Which key size is the largest valid key size that AES can be configured to use?
answer
256
question
You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must pass through a locked door to enter the main work area. Access is restricted using a smart card reader. Network jacks are provided in the reception area such that employees and vendors can access the company network for workrelated purposes. Users within the secured work area have been trained to lock their workstations if they will be leaving them for any period of time. What recommendations would you make to this organization to increase their security?
answer
Disable the switch ports connected to the network jacks in the reception area.
question
Your organization is frequently visited by sales reps. While onsite, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. What should you do? (Select two.)
answer
*Implement static IP addressing. *Implement MAC address filtering.
question
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)
answer
*Disable SSID broadcast. *Change the SSID to something other than the default.
question
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: • They use an 802.11a wireless network. • The wireless network SSID is set to BWLAN. • The wireless network is not broadcasting the network SSID. • The wireless network uses WPA2 with AES security. • Omnidirectional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security?
answer
Implement directional access points.
question
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following using a wireless network locator device: • They use an 802.11n wireless network. • The wireless network is broadcasting an SSID of Linksys. • The wireless network uses WPA2 with AES security. • Directional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security? (Select two.)
answer
*Change the SSID to something other than the default. *Disable SSID broadcast.
question
A small business named BigBikes, Inc. has hired you to evaluate their wireless network security practices. As you analyze their facility, you note the following: • They use an 802.11a wireless network. • The wireless network SSID is set to BWLAN. • The wireless network is not broadcasting the network SSID. • The wireless network uses WPA2 with AES security. • Omnidirectional access points are positioned around the periphery of the building. Based on this information, what should you recommend your client do to increase their wireless network security?
answer
Implement directional access points.
question
Your organization is frequently visited by sales reps. While onsite, they frequently plug their notebook systems into any available wall jack, hoping to get Internet connectivity. You are concerned that allowing them to do this could result in the spread of malware throughout your network. What should you do? (Select two.)
answer
*Implement static IP addressing. *Implement MAC address filtering.
question
12.10.7
answer
...
question
You want to be able to access your home computer using Remote Desktop while traveling. You enable Remote Desktop, but you find that you cannot access your computer outside of your home network. What should you do?
answer
Open the firewall port for the Remote Desktop protocol.
question
You are configuring a network firewall to allow SMTP outbound email traffic, and POP3 inbound email traffic. Which of the following IP ports should you open on the firewall? (Select two.)
answer
*25 *110
question
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the Internet, but you are unable to perform secure credit card transactions when making purchases from ecommerce websites. Which port needs to be enabled to allow secure transactions?
answer
443
question
You are configuring a firewall to allow access to a server hosted in the demilitarized zone of your network. You open IP ports 80, 25, 110 and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, email server
question
Which of the following is the best device to deploy to protect your private network from a public untrusted network?
answer
Firewall
question
Which of the following is a firewall function?
answer
Packet filtering
question
In which of the following situations should you install a firewall?
answer
You want to restrict Internet users from accessing private data on your network.
question
To access your company's internal network from home, you use Secure Shell (SSH). The administrator has recently implemented a new firewall at the network perimeter and disabled as many ports as possible. Which port needs to remain open so you can still work from home?
answer
22
question
A local dentist has contracted with you to implement a network in her new office. Because of security concerns related to patient privacy laws, she has asked that the new network meet the following criteria: • No one from the Internet should be able to access her internal network. • Email messages should be scanned for spam, phishing attacks, and malware before they reach users' workstations. • Employees should be blocked from accessing nonwork related web sites, especially sites that contain inappropriate content. • A system should be put in place to detect and prevent external attacks on her network. What should you do?
answer
Implement an all-in-one security appliance.
question
12.11.15
answer
...
question
You would like to control Internet access based on users, time of day, and Web sites visited. How can you do this?
answer
Install a proxy server. Allow Internet access only through the proxy server.
question
Which of the following functions are performed by proxy servers? (Select two.)
answer
*Block employees from accessing certain websites *Cache web pages
question
Two employees cannot access any websites on the Internet, but can still access servers on the local network, including those residing on other subnets. Other employees are not experiencing the same problem. What should you do?
answer
Identify the proxy server name and port number in Internet Options.
question
You connect your computer to a wireless network available at the local library. You find that you can't access several websites you need to on the Internet. What might be causing the problem?
answer
A proxy server is filtering access to websites.
question
You need to configure a Windows workstation with the IP address of the proxy server for your network. Click the tab in the Internet Properties window that you would use to do this.
answer
Explanation To configure the IP address of the proxy server, go to Control Panel and select Internet Options. Click the Connections tab and then select LAN settings. In the dialog displayed you can enable a proxy server for the LAN and then enter the proxy server's IP address and port number.
question
12.12.5
answer
...
question
A VPN is used primarily for what purpose?
answer
Support secured communications over an untrusted network
question
Which of the following networking devices or services prevents the establishment of VPN connections in most situations?
answer
NAT
question
Your organization employs a group of traveling salespeople who need to access the corporate home network through the Internet while they are on the road. You want to funnel remote access to the internal network through a single server. Which solution should you implement?
answer
VPN concentrator
question
A salesperson in your organization spends most of her time traveling between customer sites. After a customer visit, she must complete various managerial tasks, such as updating your organization's order database. Because she rarely comes back to your home office, she usually accesses the network from her notebook computer using WiFi access provided by hotels, restaurants, and airports. Many of these locations provide unencrypted public WiFi access, and you are concerned that sensitive data could be exposed. To remedy this situation, you decide to configure her notebook to use a VPN when accessing the home network over an open wireless connection. Which key steps should you take when implementing this configuration? (Select two.)
answer
*Configure the browser to send HTTPS requests through the VPN connection. *Configure the VPN connection to use IPsec.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP
question
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet? (Select two.)
answer
*L2TP *PPTP
question
Which of the following protocols provides authentication and encryption services for VPN traffic?
answer
IPsec
question
Which of the following statements about an SSL VPN are true? (Select two.)
answer
*Uses port 443 *Encrypts the entire communication session
question
Your antimalware software has detected a virus on your Windows 10 system. However, the antimalware software is unable to remove it, and when you try to delete the files, you can't because they are in use. What should you try first?
answer
Boot into Safe Mode and try removing the malware
question
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the Internet, and that the malware corrupted the boot block. Based on your suspicions, what actions could you take to correct the problem? (Select two.)
answer
*Boot from the Windows 7 installation DVD and use the Recovery Environment to run a startup repair. *Reimage the machine.
question
A user reports that her machine is behaving erratically. She suspects something is wrong because lately a firewall alert keeps indicating programs are trying to access the Internet, and several files have disappeared or have been renamed. What do you suspect is causing these problems?
answer
Malware infection
question
You discover that a system on your network has been infected with a worm. What is the best way to prevent the spread of the worm to other systems while you work on removing the worm?
answer
Quarantine the computer
question
You have installed antimalware software on computers at your business. Within a few days, however, you notice that one computer has a virus. When you question the user, she says she did install some software a few days ago, but it was supposed to be a file compression utility. She admits she did not scan the file before running it. What should you add to your security measures to help prevent this from happening again?
answer
User awareness training
question
Which of the following is the process of fixing problems detected by antivirus software so that the computer is restored to its original state?
answer
Remediation
question
While browsing the Internet, a popup browser window is displayed warning you that your system is infected with a virus. You are directed to click a link to remove the virus. What should you do? (Select two.)
answer
*Run a full system scan using the antimalware software installed on your system. *Update the virus definitions for your locallyinstalled antimalware software.
question
Which techniques are used in a pharming attack to redirect legitimate web traffic to malicious websites? (Select two.)
answer
*Changing the hosts file of a user's computer *Exploiting DHCP servers to deliver the IP address of poisoned DNS servers
question
Which of the following are likely symptoms of malware infection? (Select two.)
answer
*Changed file permissions *Renamed system files
question
A user reports that his machine will no longer boot properly. After asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the Internet, and that the malware has infected the system. Based on your suspicions, what actions could you take to correct the problem? (Select two.)
answer
*Use an antimalware scanner to scan for and remove the infection. *Revert the system to a restore point created before the malware infection occurred.
question
A user within your organization received an email relating how an account containing a large sum of money has been frozen by the government of a small Middle Eastern nation. The user was offered a 25% share of this account if she would help the sender transfer it to a bank in the United States. The user responded and was instructed to wire $5,000 to the sender to facilitate the transfer. She complied, but has not heard from the sender since. What type of attack occurred in this scenario?
answer
Nigerian 419 scam
question
Which of the following describes a ManintheMiddle attack?
answer
An attacker intercepts communications between two network hosts by impersonating each host.
question
A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet. What form of attack has occurred in this scenario?
answer
Spoofing
question
The TCP/IP session state between two computers on a network is being manipulated by an attacker such that she is able to insert tampered packets into the communication stream. What type of attack has occurred in this scenario?
answer
Hijacking
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New