What course of action should Brian take?
Brian, a security administrator, is responding to a virus infection. The antivirus application reports that a file has been infected with a dangerous virus and disinfecting it could damage the file. What course of action should Brian take?
What steps should he take if a report has no information?
John is responsible for providing a weekly report to his manager outlining the week’s security incidents and mitigation steps. What steps should he take if a report has no information?
Which of the following incorrectly describes mail relays?
The relay agent on a mail server plays a role in spam prevention. Which of the following incorrectly describes mail relays?
Which of the following is most likely the attack Sam used?
Brandy could not figure out how Sam gained unauthorized access to her system, since he has little computer experience. Which of the following is most likely the attack Sam used?
Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover usersR
Which of the following is the best way to reduce brute-force attacks that allow intruders to uncover users’ passwords?
Which of the following best fits this need?
Fred is a new security officer who wants to implement a control for detecting and preventing users who attempt to exceed their authority by misusing the access rights that have been assigned to them. Which of the following best fits this need?
What does not need to be in this type of documentation?
Organizations should keep system documentation on hand to ensure that the system is properly cared for, that changes are controlled, and that the organization knows what’s on the system. What does not need to be in this type of documentation?
When dealing with such emergencies, which of the following is the best approach to making changes?
There are often scenarios where the IT staff must react to emergencies and quickly apply fixes or change configurations. When dealing with such emergencies, which of the following is the best approach to making changes?
What type of exploited vulnerability allows more input than the program has allocated space to store it?
What type of exploited vulnerability allows more input than the program has allocated space to store it?
What is the degree of the team’s knowledge and what type of test is the team carrying out?
John and his team are conducting a penetration test of a client’s network. The team will conduct its testing armed only with knowledge it acquired from the Web. The network staff is aware that the testing will take place, but the penetration testing team will only work with publicly available data and some information from the client. What is the degree of the team’s knowledge and what type of test is the team carrying out?