PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following is MOST likely the reason?

Ann, a sales manager, successfully connected her company-issued smartphone to the wireless
network in her office without supplying a username/password combination. Upon disconnecting
from the wireless network, she attempted to connect her personal tablet computer to the same
wireless network and could not connect.
Which of the following is MOST likely the reason?

which of the following should be powered on FIRST to establish DNS services?

A network technician is on the phone with the system administration team. Power to the server
room was lost and servers need to be restarted. The DNS services must be the first to be
restarted. Several machines are powered off. Assuming each server only provides one service,
which of the following should be powered on FIRST to establish DNS services?

Which of the following is the MOST likely reason why the incident response team is unable to identify and corr

The incident response team has received the following email messagE.
From: monitor@ext-company.com
To: security@company.com
Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and
identify the incident.
09: 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john
09: 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable to
identify and correlate the incident?

Which of the following attacks has MOST likely occurred?

Using a heuristic system to detect an anomaly in a computer’s baseline, a system administrator
was able to detect an attack even though the company signature based IDS and antivirus did not
detect it. Further analysis revealed that the attacker had downloaded an executable file onto the
company PC from the USB port, and executed it to trigger a privilege escalation flaw.

Which of the following attacks has MOST likely occurred?