Which of the following attacks has taken place?
A user has unknowingly gone to a fraudulent site. The security analyst notices the following system
change on the user’s host:Old `hosts’ file:
127.0.0.1 localhost
New `hosts’ file:
127.0.0.1 localhost
5.5.5.5 www.comptia.com
Which of the following attacks has taken place?
which of the following?
Users at a company report that a popular news website keeps taking them to a web page with derogatory
content. This is an example of which of the following?
Which of the following is described as an attack against an application using a malicious file?
Which of the following is described as an attack against an application using a malicious file?
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access an acc
Which of the following would BEST deter an attacker trying to brute force 4-digit PIN numbers to access
an account at a bank teller machine?
Which of the following can be used by a security administrator to successfully recover a user’s forgotten pa
Which of the following can be used by a security administrator to successfully recover a user’s forgotten
password on a password protected file?
Which of the following technical controls must be implemented to enforce the corporate policy?
A security administrator must implement all requirements in the following corporate policy: Passwords
shall be protected against offline password brute force attacks. Passwords shall be protected against
online password brute force attacks. Which of the following technical controls must be implemented to
enforce the corporate policy? (Select THREE).
Which of the following would BEST describe this type of attack?
A recent spike in virus detections has been attributed to end-users visiting www.compnay.com. The
business has an established relationship with an organization using the URL of www.company.com but
not with the site that has been causing the infections. Which of the following would BEST describe this
type of attack?
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Using proximity card readers instead of the traditional key punch doors would help to mitigate:
Which of the following forms of social engineering would BEST describe this situation?
Ann an employee is visiting Joe, an employee in the Human Resources Department. While talking to Joe,
Ann notices a spreadsheet open on Joe’s computer that lists the salaries of all employees in her
department. Which of the following forms of social engineering would BEST describe this situation?
Which of the following attacks has MOST likely taken place?
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in a public
area overlooking several Automatic Teller Machines (ATMs). It is also believed that user accounts
belonging to ATM operators may have been compromised. Which of the following attacks has MOST
likely taken place?
