Which of the following attacks MOST likely occurred?

A Chief Executive Officer has learned that an exploit has been identified on the web server software, and a patch is not available yet. Which of the following attacks MOST likely occurred?A . Brute force B. Zero day C. Denial of service D. On-pathView AnswerAnswer: B Explanation: A zero-day attack...

June 29, 2023 No Comments READ MORE +

Which of the following types of documents is the administrator MOST likely creating?

A systems administrator is creating a new document with a list of the websites that users are allowed to access. Which of the following types of documents is the administrator MOST likely creating?A . Access control list B. Acceptable use policy C. Incident report D. Standard operating procedureView AnswerAnswer: A...

June 29, 2023 No Comments READ MORE +

Which of the following is the MOST likely next step in the change process?

A change advisory board just approved a change request. Which of the following is the MOST likely next step in the change process?A . End user acceptance B. Perform risk analysis C. Communicate to stakeholders D. Sandbox testingView AnswerAnswer: D Explanation: The risk analysis should be performed before it's taken...

June 29, 2023 No Comments READ MORE +

Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings tool?

A user reports that text on the screen is too small. The user would like to make the text larger and easier to see. Which of the following is the BEST way for the user to increase the size of text, applications, and other items using the Windows 10 Settings...

June 28, 2023 No Comments READ MORE +

Which of the following BEST describes why the system still has malware?

A Windows workstation that was recently updated with approved system patches shut down instead of restarting. Upon reboot, the technician notices an alert stating the workstation has malware in the root OS folder. The technician promptly performs a System Restore and reboots the workstation, but the malware is still detected....

June 28, 2023 No Comments READ MORE +

Which of the following should the technician perform NEXT to troubleshoot the issue?

A user is unable to access a website, which is widely used across the organization, and receives the following error message: The security certificate presented by this website has expired or is not yet valid. The technician confirms the website works when accessing it from another computer but not from...

June 28, 2023 No Comments READ MORE +

Which of the following is the NEXT step the technician should take to find the cause of the leaked data?

Sensitive data was leaked from a user's smartphone. A technician discovered an unapproved application was installed, and the user has full access to the device's command shell. Which of the following is the NEXT step the technician should take to find the cause of the leaked data?A . Restore the...

June 28, 2023 No Comments READ MORE +

Which of the following BEST describes the security benefits realized after this deployment?

A network administrator is deploying a client certificate lo be used for Wi-Fi access for all devices m an organization The certificate will be used in conjunction with the user's existing username and password. Which of the following BEST describes the security benefits realized after this deployment? A. Multifactor authentication...

June 28, 2023 No Comments READ MORE +

Which of the following describes this incident?

Someone who is fraudulently claiming to be from a reputable bank calls a company employee. Which of the following describes this incident?A . Pretexting B. Spoofing C. Vishing D. ScarewareView AnswerAnswer: C Explanation: Vishing is a type of social engineering attack where a fraudulent caller impersonates a legitimate entity, such...

June 28, 2023 No Comments READ MORE +

Which of the following is the BEST way the officer can secure the workstation quickly when walking away?

A police officer often leaves a workstation for several minutes at a time. Which of the following is the BEST way the officer can secure the workstation quickly when walking away?A . Use a key combination to lock the computer when leaving. B. Ensure no unauthorized personnel are in the...

June 28, 2023 No Comments READ MORE +