Which of the following malware categories BEST describes this program?
A program has been discovered that infects a critical Windows system executable and stays
dormant in memory. When a Windows mobile phone is connected to the host, the program infects
the phone’s boot loader and continues to target additional Windows PCs or phones. Which of the
following malware categories BEST describes this program?
Which of the following attacks has taken place?
A user has unknowingly gone to a fraudulent site. The security analyst notices the following
system change on the user’s host:
Old ‘hosts’ file:
127.0.0.1 localhost
New ‘hosts’ file:
127.0.0.1 localhost
5.5.5.5 www.comptia.com
Which of the following attacks has taken place?
Which of the following BEST addresses his concerns?
Pete, the system administrator, has concerns regarding users losing their company provided
smartphones. Pete’s focus is on equipment recovery. Which of the following BEST addresses his
concerns?
Which of the following attacks has MOST likely taken place?
An investigator recently discovered that an attacker placed a remotely accessible CCTV camera in
a public area overlooking several Automatic Teller Machines (ATMs). It is also believed that user
accounts belonging to ATM operators may have been compromised. Which of the following
attacks has MOST likely taken place?
Which of the following would BEST serve this purpose?
A security administrator wants to deploy security controls to mitigate the threat of company
employees’ personal information being captured online. Which of the following would BEST serve
this purpose?
Which of the following attacks MOST likely took place?
A user commuting to work via public transport received an offensive image on their smart phone
from another commuter. Which of the following attacks MOST likely took place?
Which of the following statements is MOST likely to be included in the security awareness training about P2P?
Which of the following statements is MOST likely to be included in the security awareness training
about P2P?
Which of the following types of attacks was attempted?
An attacker attempted to compromise a web form by inserting the following input into the
username fielD.
admin)(|(password=*))
Which of the following types of attacks was attempted?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following is BEST carried out immediately after a security breach is discovered?
Which of the following documents is the CIO MOST likely updating?
A company’s chief information officer (CIO) has analyzed the financial loss associated with the
company’s database breach. They calculated that one single breach could cost the company
$1,000,000 at a minimum. Which of the following documents is the CIO MOST likely updating?