PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following describes how the employee is leaking these secrets?

Ann, a security analyst, has been notified that trade secrets are being leaked from one of the
executives in the corporation. When reviewing this executive’s laptop she notices several pictures
of the employee’s pets are on the hard drive and on a cloud storage network. When Ann hashes
the images on the hard drive against the hashes on the cloud network they do not match. Which of
the following describes how the employee is leaking these secrets?

Which of the following attacks is taking place?

A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to
connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?