Search Header Logo

241-270

Authored by siso coc

Computers, Social Studies, Professional Development

KG

Used 11+ times

241-270
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.241 Several employees have noticed other bystanders can clearly observe a terminal where

passcodes are being entered. Which of the following can be eliminated with the use of a privacy

screen?

(A). Shoulder surfing

(B). Spear phishing

(C). Impersonation attack

(D). Card cloning

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.242 A security analyst needs to complete an assessment. The analyst is logged into a server and

must use native tools to map services running on it to the server's listening ports. Which of the

following tools can BEST accomplish this talk?

(A). Netcat

(B). Netstat

(C). Nmap

(D). Nessus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.243 A workwide manufacturing company has been experiencing email account compromised. In

one incident, a user logged in from the corporate office in France, but then seconds later, the same

user account attempted a login from Brazil. Which of the following account policies would BEST

prevent this type of attack?

(A). Network location

(B). Impossible travel time

(C). Geolocation

(D). Geofencing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.244 A user recently attended an exposition and received some digital promotional materials The

user later noticed blue boxes popping up and disappearing on the computer, and reported receiving

several spam emails, which the user did not open Which of the following is MOST likely the cause of

the reported issue?

(A). There was a drive-by download of malware

(B). The user installed a cryptominer

(C). The OS was corrupted

(D). There was malicious code on the USB drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.245 An organization is concerned about intellectual property theft by employee who leave the

organization. Which of the following will be organization MOST likely implement?

(A). CBT

(B). NDA

(C). MOU

(D). AUP

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

NO.246 An end user reports a computer has been acting slower than normal for a few weeks. During

an investigation, an analyst determines the system is sending the user's email address and a ten-digit

number to an IP address once a day. The only recent log entry regarding the user's computer is the

following:

Which of the following is the MOST likely cause of the issue?

(A). The end user purchased and installed a PUP from a web browser

(B). A bot on the computer is brute forcing passwords against a website

(C). A hacker is attempting to exfiltrate sensitive data

(D). Ransomware is communicating with a command-and-control server.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

NO.247 An organization would like to remediate the risk associated with its cloud service provider

not meeting its advertised 99.999% availability metrics. Which of the following should the

organization consult for the exact requirements for the cloud provider?

(A). SLA

(B). BPA

(C). NDA

(D). MOU

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?