Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is malicious.
The file was found on an underused server and appears to contain a zero-day exploit. Which of
the following can the researcher do to determine if the file is malicious in nature?
which of the following?
A security administrator has concerns about new types of media which allow for the mass
distribution of personal comments to a select group of people. To mitigate the risks involved with
this media, employees should receive training on which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants
not to provide too much personal information on social media web sites. This advice would BEST
protect people from which of the following?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In
addition to protecting company information from being accidentally leaked, which additional
security benefit does this provide?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of
collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of
collaboration?
Which of the following has serious security implications for large organizations and can potentially allow an
Which of the following has serious security implications for large organizations and can potentially
allow an attacker to capture conversations?
The use of social networking sites introduces the risk of:
The use of social networking sites introduces the risk of: