Which of the following malware types typically allows a…
Which of the following malware types typically allows an attacker to monitor a user’s computer, is characterized by a drive-by download, and requires no user
interaction?
Which of the following is MOST likely to be contained i…
A user casually browsing the Internet is redirected to a warez site where a number of pop-ups appear. After clicking on a pop-up to complete a survey, a drive-by
download occurs. Which of the following is MOST likely to be contained in the download?
Which of the following malware categories BEST describe…
A program has been discovered that infects a critical Windows system executable and stays dormant in memory. When a Windows mobile phone is connected to
the host, the program infects the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the following malware categories BEST
describes this program?
Which of the following malware types may require user i…
Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing
habits?
Which of the following would provide the IT department …
A cafe provides laptops for Internet access to their customers. The cafe is located in the center corridor of a busy shopping mall. The company has experienced
several laptop thefts from the cafe during peak shopping hours of the day. Corporate has asked that the IT department provide a solution to eliminate laptop theft.
Which of the following would provide the IT department with the BEST solution?
which of the following concepts?
Matt, a security administrator, wants to ensure that the message he is sending does not get intercepted or modified in transit. This concern relates to which of the
following concepts?
which of the following types of security control?
It is important to staff who use email messaging to provide PII to others on a regular basis to have confidence that their messages are not intercepted or altered
during transmission. They are concerned about which of the following types of security control?
The firm does this to address:
A software firm posts patches and updates to a publicly accessible FTP site. The software firm also posts digitally signed checksums of all patches and updates.
The firm does this to address:
which of the following concepts?
An email client says a digital signature is invalid and the sender cannot be verified. The recipient is concerned with which of the following concepts?
Which of the following would have assured that the bid …
Company A submitted a bid on a contract to do work for Company B via email. Company B was insistent that the bid did not come from Company A. Which of the
following would have assured that the bid was submitted by Company A?