Filters
Question type

Study Flashcards

Your company has decided that security is very important and wants to add a second security check when workers are logging in to their computers. The company issued key fobs to all the employees. The key fob generates a code for them to enter when logging in to the computer. ​ What type of security is your company using?


A) Key fob
B) Smart card
C) Biometric lock
D) Hardware token

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Joann turned on her Windows 10 computer today, and while the computer was booting up, it shut down. She restarted the computer and it booted fine but ran slowly. She opened Task Manager and noticed that her CPU was running at 98% capacity and her network at 75% capacity. When she checked to see what process was using so much network connectivity, she received a message saying that access to the process was denied.   Based on these indicators, what should Joann do with her computer? (Select all that apply.)


A) Run antivirus software.
B) Disconnect from the network.
C) Refresh Windows.
D) Roll back to a previous restore point.
E) Check the file permissions.

F) D) and E)
G) A) and B)

Correct Answer

verifed

verified

Currently James's company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS. ​ What will James recommend as an upgrade to RADIUS?


A) AES
B) WPA2
C) RADIUS+
D) TACACS+

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Kevin recently discovered that unknown processes are running in the background on his company's web server. During a performance review, he also noticed that the CPU is working at 80% during downtimes. Kevin believes that software is running in the background and causing the CPU to run at such a high percentage. Kevin discovers that his server along with several other computers in the company have been used to perform a DDoS on another website.   What type of attack occurred?


A) Botnet
B) Spyware
C) Zero-day
D) DDoS

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Jennifer's company currently uses Windows Active Directory to provide centralized authentication, authorization, and accounting to manage users on its network. The company uses a wireless network and an earlier authentication service on the server to authenticate end users accessing resources on the network. ​ What type of service is Jennifer's company using?


A) TKIP
B) WPA2
C) WEP
D) RADIUS

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

If you are working on a client's computer and you believe that you have found a violation of the AUP, what is your next step?


A) Ignore the violation.
B) Report the incident through the proper channels.
C) Ask the user about the violation.
D) Tell your coworkers what you found.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Lance works for a company that allows users to bring their own devices to work. Last week Lance purchased a software package from a company that allows him to change fonts on pictures that he uses in his work presentations. Lance wants to share the program with his coworker Susan.   Is Lance allowed to share the software with Susan?


A) Susan would need to purchase the software from the company.
B) Lance purchased the software for work and can share it with coworkers.
C) The software is open source, so Lance can share the software with Susan.
D) The software was purchase by Lance with a site license and can be used by Susan.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Larry has participated in a change proposal for his company. During the planning stage, Larry was told that his role in the change would be small but important. In the implementation stage, Larry completed his task according to the stipulations and timeframe of the plan. However, Larry was called in five times during the change to help others complete the change process. ​ Where in the change management process did the problem occur?


A) Risk analysis
B) Scope of plan
C) Purpose of change
D) Back-out plan

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Peggy found a freely distributed software package for her small business that will allow its sales to be tracked into a database for inventory purposes. ​ Can Peggy install this software on all the computers in her store?


A) Yes, this is open source software.
B) Yes, because she purchased the software.
C) No, this is only for Peggy's computer.
D) No, even though she purchased the software, it was one copy for one computer.

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

When working with a security consultant that your company has hired, you notice that he is running software on one of the machines. He explains that the program is running a brute force attack that is using every word in the English language to see if the Administrator password can be cracked.   What type of attack is he attempting?


A) Rainbow table
B) Dictionary
C) Zero-day
D) Phishing

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Jacob has discovered what he believes is a crime on a computer that he is servicing. Jacob has identified and gone through the proper channels to report the incident. He has created a backup of the entire hard drive to preserve the evidence and has started to document the evidence. ​ What must Jacob maintain so the evidence can be used to prosecute the crime?


A) Incident documentation
B) Chain of custody
C) A backup of the data
D) Private property laws

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

One of your clients at work calls and is irate because he had to change his password and now he can't seem to find one that will match the strength needed for the company server. After he finishes venting, you tell him you will send him the document that explains why he needs to have a strong password.   What document will you send the client?


A) Acceptable use policy
B) Regulatory and compliance policy
C) Knowledge base
D) Password policy

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client's desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When Lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When Lane arrived, she checked to see how much free space the computer had available and found that it had 250GB less than the day before.   What is the issue with the client's computer?


A) Spam
B) Corrupt hard drive
C) Bad hard drive driver
D) Computer virus

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

Based on her research of the symptoms, Sara believes her computer is infected with a virus. Sara has an anti-malware program on the computer.   What should she do before she runs the anti-malware program?


A) Install Windows updates.
B) Update malware drivers.
C) Update malware software.
D) Update malware signatures.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Becky has been assigned to help with a major change to her company's accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor causes the change to fail.   What is Becky's mistake called?


A) Scope of change
B) Out of scope modification
C) Change modification
D) Request for comments

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Nick works for a software development company that has just created a new application that will revolutionize the computer security industry. Nick's company owns the patent for the software and has a copyright for the software. The company would like to sell this new software but they are concerned about someone pirating the software. ​ What can Nick's company use to prevent software piracy?


A) Copyright
B) EULA
C) DRM
D) Issue a license

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now the company must troubleshoot the server. ​ What can the company implement that will get the website up and running without the new server?


A) Back-out plan
B) Plan for change
C) Risk analysis
D) Change analysis plan

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

You have noticed that your computer is running slower than normal and that the amount of storage space on the hard drive is decreasing, even though you have not been doing anything different on your computer. You believe a program is replicating by attaching itself to other programs.   What type of malware is on your computer?


A) Trojan
B) Ransomware
C) Rootkit
D) Virus

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Victoria is working on a computer that was infected with a virus when a client clicked on a link and downloaded a Trojan. Victoria researched the virus and learned that the virus might have written itself into System Restore.   What does Victoria need to do to run the antivirus software on System Restore?


A) Disable System Protection.
B) Back up the restore point.
C) Enable System Protection.
D) Run the antivirus software on a restore point.

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to her antivirus program failed. When she checked the update history, she discovered that the program had not been updated for two weeks. She restarted her computer and noticed that a file she was working on was no longer available. She also noticed that the network connection was sending data, even when she was not connected to the Internet. ​ What should Jannette do first on her computer?


A) Run anti-malware program.
B) Roll back to a previous date.
C) Quarantine the system.
D) Remediate the infected system.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 71

Related Exams

Show Answer