PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which of the following security threats?

A user receives a phone call from a person claiming to be from technical support. This person knows
the user’s name and that the user has Windows installed on their computer. The technician directs
the user to open Event Viewer and look at some event log entries to demonstrate the effects of a
virus on the computer. The technician also asks the user for their user ID and password so that they
can clean the computer. This is an example of which of the following security threats?

Which of the following utilities did the technician use to check this parameter with the output listed below?

A network technician is trying to run a protocol analyzer and is instructed to record the chimney
offload state of TCP. Which of the following utilities did the technician use to check this parameter
with the output listed below?
Querying active state…
TCP Global Parameters
———————————————-
Receive-Side Scaling State : enabled
Chimney Offload State : disabled
Receive Window Auto-Tuning Level : normal
Add-On Congestion Control Provider : ctcp
ECN Capability : disabled
RFC 1323 Timestamps : disabled