Which of the following malware categories BEST describes this program?
A program has been discovered that infects a critical Windows system executable and stays
dormant in memory. When a Windows mobile phone is connected to the host, the program infects
the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the
following malware categories BEST describes this program?
Which of the following attacks has taken place?
A user has unknowingly gone to a fraudulent site. The security analyst notices the following
system change on the user’s host:
Old ‘hosts’ file:
127.0.0.1 localhost
New ‘hosts’ file:
127.0.0.1 localhost
5.5.5.5 www.comptia.com
Which of the following attacks has taken place?
Which of the following attacks has MOST likely taken place?
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in
a public area overlooking several Automatic Teller Machines (ATMs). It is also believed that user
accounts belonging to ATM operators may have been compromised. Which of the following
attacks has MOST likely taken place?
Which of the following attacks MOST likely took place?
A user commuting to work via public transport received an offensive image on their smart phone
from another commuter. Which of the following attacks MOST likely took place?
Which of the following types of attacks was attempted?
An attacker attempted to compromise a web form by inserting the following input into the
username fielD.
admin)(|(password=*))
Which of the following types of attacks was attempted?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following BEST describes the type of attack that is occurring?
Which of the following BEST describes the type of attack that is occurring?
Which of the following is a hardware-based security technology included in a computer?
Which of the following is a hardware-based security technology included in a computer?
Which of the following is a hardware-based security technology included in a computer?
Which of the following is a hardware-based security technology included in a computer?