Which of the following BEST describes the compromised system?
An administrator is investigating a system that may potentially be compromised, and sees the
following log entries on the router.
*Jul 15 14:47:29.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 3 packets.
*Jul 15 14:47:38.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 6 packets.
*Jul 15 14:47:45.779:%Router1: list 101 permitted tcp 192.10.3.204(57222) (FastEthernet 0/3) ->
10.10.1.5 (6667), 8 packets.
Which of the following BEST describes the compromised system?
Which of the following is the BEST way to run the malware scanner?
A Windows-based computer is infected with malware and is running too slowly to boot and run a
malware scanner. Which of the following is the BEST way to run the malware scanner?
Which of the following should be implemented to give the appropriate access while enforcing least privilege?
A company has 5 users. Users 1, 2 and 3 need access to payroll and users 3, 4 and 5 need
access to sales. Which of the following should be implemented to give the appropriate access
while enforcing least privilege?
Which of the following BEST describes this attack?
The Chief Executive Officer (CEO) receives a suspicious voice mail warning of credit card fraud.
No one else received the voice mail. Which of the following BEST describes this attack?
which of the following?
RC4 is a strong encryption protocol that is generally used with which of the following?
Which of the following MUST be implemented?
A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?
Which of the following can the administrator do to decrypt the file?
A security administrator at a company which implements key escrow and symmetric encryption
only, needs to decrypt an employee’s file. The employee refuses to provide the decryption key to
the file. Which of the following can the administrator do to decrypt the file?
Which of the following should the administrator configure to redirect traffic destined for the default HTTP po
A company administrator has a firewall with an outside interface connected to the Internet and an
inside interface connected to the corporate network. Which of the following should the
administrator configure to redirect traffic destined for the default HTTP port on the outside
interface to an internal server listening on port 8080?
Which of the following methods would achieve this goal?
A system administrator is setting up a file transfer server. The goal is to encrypt the user
authentication and the files the user is sending using only a user ID and a key pair. Which of the
following methods would achieve this goal?
Which of the following components of an all-in-one security appliance would MOST likely be configured in order
Which of the following components of an all-in-one security appliance would MOST likely be
configured in order to restrict access to peer-to-peer file sharing websites?