This is an example of:
A computer is found to be infected with malware and a technician re-installs the operating system. The
computer remains infected with malware. This is an example of:
Which of the following types of technologies is used by security and research…?
Which of the following types of technologies is used by security and research personnel for identification
and analysis of new security threats in a networked environment by using false data/hosts for information
collection?
This is known as:
A user has plugged in a wireless router from home with default configurations into a network jack at the
office. This is known as:
Which of the following kind of IDS is in use?
Four weeks ago, a network administrator applied a new IDS and allowed it to gather baseline data. As
rumors of a layoff began to spread, the IDS alerted the network administrator that access to sensitive
client files had risen far above normal. Which of the following kind of IDS is in use?
Which of the following could be utilized to provide protection from this type of attack?
A security administrator is notified that users attached to a particular switch are having intermittent
connectivity issues. Upon further research, the administrator finds evidence of an ARP spoofing attack.
Which of the following could be utilized to provide protection from this type of attack?
Which of the following controls can further secure the data in the central storage system?
An organization must implement controls to protect the confidentiality of its most sensitive data. The
company is currently using a central storage system and group based access control for its sensitive
information. Which of the following controls can further secure the data in the central storage system?
Which of the following does he need to estimate NEXT in order to complete his risk calculations?
Joe, the information security manager, is tasked with calculating risk and selecting controls to protect a
new system. He has identified people, environmental conditions, and events that could affect the new
system. Which of the following does he need to estimate NEXT in order to complete his risk calculations?
Which of the following is the MOST likely reason for the incident?
A network administrator identifies sensitive files being transferred from a workstation in the LAN to an
unauthorized outside IP address in a foreign country. An investigation determines that the firewall has
not been altered, and antivirus is up-to-date on the workstation. Which of the following is the MOST likely
reason for the incident?
Which of the following should be implemented to ensure that a malicious insider will not be able to successful
A security administrator must implement a network that is immune to ARP spoofing attacks. Which of the
following should be implemented to ensure that a malicious insider will not be able to successfully use
ARP spoofing techniques?
Which of the following types of malware is the laptop MOST likely infected with?
After working on his doctoral dissertation for two years, Joe, a user, is unable to open his dissertation file.
The screen shows a warning that the dissertation file is corrupted because it is infected with a backdoor,and can only be recovered by upgrading the antivirus software from the free version to the commercial
version. Which of the following types of malware is the laptop MOST likely infected with?