
Comp_Sec_361-390

Quiz
•
Other
•
KG
•
Easy

Hacker Eurotech
Used 5+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.361 A security analyst is investigating multiple hosts that are communicating to external IP addresses during the hours of 2:00 a.m - 4:00 am. The malware has evaded detection by traditional antivirus software. Which of the following types of malware is MOST likely infecting the hosts?
A RAT
Ransomware
Logic bomb
A worm
2.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.362 A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
Loss of proprietary information
Damage to the company's reputation
Social engineering
Credential exposure
Answer explanation
In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information think phishing, spoofing. That is not being demonstrated in this question. The company is protecting themselves from loss of proprietary information by clearing it all out. so that if anyone in the tour is looking to take it they will be out of luck
3.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.363 A desktop support technician recently installed a new document-scanning software program on a computer However, when the end user tried to launch the program, it did not respond. Which of the following is MOST likely the cause?
A new firewall rule is needed to access the application.
The system was quarantined for missing software updates
The software was not added to the application whitelist.
The system was isolated from the network due to infected software.
4.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.364 Users reported several suspicious activities within the last two weeks that resulted in several unauthorized transactions. Upon investigation, the security analyst found the following: Multiple reports of breached credentials within that time period Traffic being redirected in certain parts of the network * Fraudulent emails being sent by various internal users without their consent Which of the following types of attacks was MOST likely used?
Replay attack
Race condition
Cross site scripting
Request forgeries
5.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.365 An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?
It allows for the sharing of digital forensics data across organizations
It provides insurance in case of a data breach
It provides complimentary training and certification resources to IT security staff.
It certifies the organization can work with foreign entities that require a security clearance
It assures customers that the organization meets security standards
Answer explanation
According to the ISO https://www.iso.org/standard/54534.html ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature.
6.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.366 A security analyst is configuring a large number of new company-issued laptops. The analyst received the following requirements:
* The devices will be used internationally by staff who travel extensively.
*Occasional personal use is acceptable due to the travel requirements.
*Users must be able to install and configure sanctioned programs and productivity suites.
*The devices must be encrypted
* The devices must be capable of operating in low-bandwidth environments.
Which of the following would provide the GREATEST benefit to the security posture of the devices?
Configuring an always-on VPN
Implementing application whitelisting
Requiring web traffic to pass through the on-premises content filter
Setting the antivirus DAT update schedule to weekly
7.
MULTIPLE CHOICE QUESTION
5 mins • 1 pt
NO.367 A recently discovered zero-day exploit utilizes an unknown vulnerability in the SMB network protocol to rapidly infect computers. Once infected, computers are encrypted and held for ransom. Which of the following would BEST prevent this attack from reoccurring?
Configure the perimeter firewall to deny inbound external connections to SMB ports.
Ensure endpoint detection and response systems are alerting on suspicious SMB connections.
Deny unauthenticated users access to shared network folders.
Verify computers are set to install monthly operating system, updates automatically.
Create a free account and access millions of resources
Similar Resources on Wayground
26 questions
ISYS3439 - Cyber GRC

Quiz
•
University
33 questions
Government & Public Administration Career Cluster

Quiz
•
6th - 8th Grade
25 questions
Standard 6: Retirement Planning

Quiz
•
9th - 12th Grade
31 questions
SWR302 30-60

Quiz
•
KG
25 questions
Career Clusters

Quiz
•
9th - 12th Grade
25 questions
Monetary & Fiscal Policy

Quiz
•
10th - 12th Grade
25 questions
Careers in Information Technology

Quiz
•
8th Grade
32 questions
Career Clusters

Quiz
•
8th - 10th Grade
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade