Which of the following can the researcher do to determine if the file is malicious in nature?
A security researcher wants to reverse engineer an executable file to determine if it is malicious. The file
was found on an underused server and appears to contain a zero-day exploit. Which of the following can
the researcher do to determine if the file is malicious in nature?
which of the following?
A security administrator has concerns about new types of media which allow for the mass distribution of
personal comments to a select group of people. To mitigate the risks involved with this media, employees
should receive training on which of the following?
which of the following?
The information security team does a presentation on social media and advises the participants not to
provide too much personal information on social media web sites. This advice would BEST protect people
from which of the following?
which additional security benefit does this provide?
Pete, the system administrator, has blocked users from accessing social media web sites. In addition to
protecting company information from being accidentally leaked, which additional security benefit does
this provide?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following is a security risk regarding the use of public P2P as a method of collaboration?
Which of the following has serious security implications for large organizations and can potentially allow an
Which of the following has serious security implications for large organizations and can potentially allow
an attacker to capture conversations?
The use of social networking sites introduces the risk of:
The use of social networking sites introduces the risk of:
Which of the following statements is MOST likely to be included in the security awareness training about P2P?
Which of the following statements is MOST likely to be included in the security awareness training about
P2P?
Which of the following would BEST prove the success of the program?
A security team has established a security awareness program. Which of the following would BEST prove
the success of the program?
Which of the following is an attack vector that can cause extensive physical damage to a datacenter without ph
Which of the following is an attack vector that can cause extensive physical damage to a datacenter
without physical access?
