Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type of malware?
Which of the following has MOST likely been installed on the server?
During a server audit, a security administrator does not notice abnormal activity. However, a
network security analyst notices connections to unauthorized ports from outside the corporate
network. Using specialized tools, the network security analyst also notices hidden processes
running. Which of the following has MOST likely been installed on the server?
Which of the following has MOST likely been installed on the server?
During a server audit, a security administrator does not notice abnormal activity. However, a
network security analyst notices connections to unauthorized ports from outside the corporate
network. Using specialized tools, the network security analyst also notices hidden processes
running. Which of the following has MOST likely been installed on the server?
The administrator should be looking for the presence of a/an:
A trojan was recently discovered on a server. There are now concerns that there has been a
security breach that allows unauthorized people to access data. The administrator should be
looking for the presence of a/an:
The administrator should be looking for the presence of a/an:
A trojan was recently discovered on a server. There are now concerns that there has been a
security breach that allows unauthorized people to access data. The administrator should be
looking for the presence of a/an:
which of the following?
Two programmers write a new secure application for the human resources department to store
personal identifiable information. The programmers make the application available to themselves
using an uncommon port along with an ID and password only they know. This is an example of
which of the following?
Which of the following should the CIO be concerned with?
The Chief Information Officer (CIO) receives an anonymous threatening message that says
“beware of the 1st of the year”. The CIO suspects the message may be from a former disgruntled
employee planning an attack.
Which of the following should the CIO be concerned with?