Topic 4: Exam Pool D (NEW)
The process of passively gathering information poor to launching a cyberattack is called:
A.
tailgating
B.
reconnaissance
C.
pharming
D.
prepending
reconnaissance
A remote user recently took a two-week vacation abroad and brought along a corporateowned
laptop. Upon returning to work, the user has been unable to connect the laptop to
the VPN. Which of the following is the MOST likely reason for the user’s inability to connect
the laptop to the VPN? (Select TWO).
A.
Due to foreign travel, the user’s laptop was isolated from the network.
B.
The user’s laptop was quarantined because it missed the latest path update.
C.
The VPN client was blacklisted.
D.
The user’s account was put on a legal hold
Due to foreign travel, the user’s laptop was isolated from the network.
The user’s laptop was quarantined because it missed the latest path update.
A security analyst is configuring a large number of new company-issued laptops. The
analyst received the following requirements:
• The devices will be used internationally by staff who travel extensively.
• Occasional personal use is acceptable due to the travel requirements.
• Users must be able to install and configure sanctioned programs and productivity suites.
• The devices must be encrypted
• The devices must be capable of operating in low-bandwidth environments.
Which of the following would provide the GREATEST benefit to the security posture of the
devices?
A.
Configuring an always-on VPN
B.
Implementing application whitelisting
C.
Requiring web traffic to pass through the on-premises content filter
D.
Setting the antivirus DAT update schedule to weekly
Configuring an always-on VPN
An end user reports a computer has been acting slower than normal for a few weeks.
During an investigation, an analyst determines the system is sending the user's email
address and a ten-digit number to an IP address once a day. The only recent log entry
regarding the user's computer is the following:
Which of the following is the MOST likely cause of the issue?
A.
The end user purchased and installed a PUP from a web browser
B.
A bot on the computer is brute forcing passwords against a website
C.
A hacker is attempting to exfiltrate sensitive data
D.
Ransomware is communicating with a command-and-control server.
The end user purchased and installed a PUP from a web browser
Which of the following would MOST likely support the integrity of a voting machine?
A.
Asymmetric encryption
B.
Blockchain
C.
Transport Layer Security
D.
Perfect forward secrecy
Perfect forward secrecy
Page 19 out of 178 Pages |
Previous |