PrepAway - Latest Free Exam Questions & Answers

Category: JK0-022

Exam JK0-022: CompTIA Academic/E2C Security+ Certification

Which of the following is the MOST likely reason why the incident response team is unable to identify and corr

The incident response team has received the following email messagE.
From: monitor@ext-company.com
To: security@company.com
Subject: Copyright infringement
A copyright infringement alert was triggered by IP address 13.10.66.5 at 09: 50: 01 GMT.
After reviewing the following web logs for IP 13.10.66.5, the team is unable to correlate and
identify the incident.
09: 45: 33 13.10.66.5 http: //remote.site.com/login.asp?user=john
09: 50: 22 13.10.66.5 http: //remote.site.com/logout.asp?user=anne
10: 50: 01 13.10.66.5 http: //remote.site.com/access.asp?file=movie.mov
11: 02: 45 13.10.65.5 http: //remote.site.com/download.asp?movie.mov=ok
Which of the following is the MOST likely reason why the incident response team is unable
to identify and correlate the incident?

Which of the following attacks has MOST likely occurred?

Using a heuristic system to detect an anomaly in a computer’s baseline, a system
administrator was able to detect an attack even though the company signature based IDS
and antivirus did not detect it. Further analysis revealed that the attacker had downloaded an
executable file onto the company PC from the USB port, and executed it to trigger a privilege
escalation flaw. Which of the following attacks has MOST likely occurred?

Which of the following can a security technician implement to ensure that documents stored on Joe’s desktop

After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes
that the document is no longer encrypted. Which of the following can a security technician
implement to ensure that documents stored on Joe’s desktop remain encrypted when moved
to external media or other network based storage?


Page 13 of 22« First...1112131415...20...Last »